General

  • Target

    4103ecb3fca001bd1b947d269874732f98d3738164e6df4ff9943092674e81e4N

  • Size

    510KB

  • Sample

    250113-pl9xls1rg1

  • MD5

    ef736d89983bbb424719d06a93344c40

  • SHA1

    258349d1454dd7ebc9222585289ce18103e63eab

  • SHA256

    4103ecb3fca001bd1b947d269874732f98d3738164e6df4ff9943092674e81e4

  • SHA512

    2a30b2de9c784f8abbcca8129dccc5105cabb6187837b16f64e303d0a9961234da76dba3b491dcf8d35faddcdc200405c573ad4890b9f584600846766d39328d

  • SSDEEP

    12288:UAJfG7BG7Ihl4RoyJqTf3gZRh0wYAjA77AOgm/CQlzsOaIWaPa2888888888888u:Un07IY6yJqb3gzhO8Y7Mm/CQJsOahr3

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

5.9.178.143:443

2.58.16.89:8443

37.139.2.140:3889

rc4.plain
rc4.plain

Targets

    • Target

      4103ecb3fca001bd1b947d269874732f98d3738164e6df4ff9943092674e81e4N

    • Size

      510KB

    • MD5

      ef736d89983bbb424719d06a93344c40

    • SHA1

      258349d1454dd7ebc9222585289ce18103e63eab

    • SHA256

      4103ecb3fca001bd1b947d269874732f98d3738164e6df4ff9943092674e81e4

    • SHA512

      2a30b2de9c784f8abbcca8129dccc5105cabb6187837b16f64e303d0a9961234da76dba3b491dcf8d35faddcdc200405c573ad4890b9f584600846766d39328d

    • SSDEEP

      12288:UAJfG7BG7Ihl4RoyJqTf3gZRh0wYAjA77AOgm/CQlzsOaIWaPa2888888888888u:Un07IY6yJqb3gzhO8Y7Mm/CQJsOahr3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

MITRE ATT&CK Enterprise v15

Tasks