Analysis

  • max time kernel
    57s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 03:26

General

  • Target

    ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617.exe

  • Size

    510KB

  • MD5

    35f2c2d7baf199692f757c075ac0bc44

  • SHA1

    c181c8f2fd20d847a70e10d72e25fac3983413c3

  • SHA256

    ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617

  • SHA512

    e0738e5c94b0d544228c265444186923caa0790aef79f49a644a02fa3cda00770a07de8be8fc6acee9d2d540d348e636794749348deab20842453e1f2d29ae13

  • SSDEEP

    12288:UAJfG7BG7Ihl4RoyJqTf3gZRh0wYAjA77AOgm/CQlzsOaIWaPa2888888888888x:Un07IY6yJqb3gzhO8Y7Mm/CQJsOahr3m

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

5.9.178.143:443

2.58.16.89:8443

37.139.2.140:3889

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617.exe
    "C:\Users\Admin\AppData\Local\Temp\ac9f08e36716cbb3777778d9144620618a2ee26bea0512da55f76c5290bd4617.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3316-0-0x0000000000740000-0x000000000077C000-memory.dmp

    Filesize

    240KB

  • memory/3316-1-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/3316-3-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/3316-2-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB