General

  • Target

    de48c0ac99319fdd559550293c43a05041cccf49370442ff006abfac87ad10f1.exe

  • Size

    164KB

  • Sample

    250116-eqzbkasnem

  • MD5

    f0fd4f975c0245d3a798bb5ec804fefd

  • SHA1

    5172ba78a8a0c471a185c906c25e627d21105bcd

  • SHA256

    de48c0ac99319fdd559550293c43a05041cccf49370442ff006abfac87ad10f1

  • SHA512

    818f6794f6266384ca8fbb5b1582d771dcad5c452c09d673f6bcfd7d3d5deffa869787dc38ea2a62726c85b079856ea2e444f6b86755823dd505c9941db0b9c5

  • SSDEEP

    3072:vcf+u4HhwG5A7kJUjc/8JTAf5NRj/BtWsaeEaUsFGWGLorDfxVi67zq44r:vBOGu7yf5LVtufcVDpj7zqn

Malware Config

Extracted

Family

dridex

C2

2.56.212.75:443

103.80.51.61:691

88.220.65.41:3389

185.69.154.108:691

Targets

    • Target

      de48c0ac99319fdd559550293c43a05041cccf49370442ff006abfac87ad10f1.exe

    • Size

      164KB

    • MD5

      f0fd4f975c0245d3a798bb5ec804fefd

    • SHA1

      5172ba78a8a0c471a185c906c25e627d21105bcd

    • SHA256

      de48c0ac99319fdd559550293c43a05041cccf49370442ff006abfac87ad10f1

    • SHA512

      818f6794f6266384ca8fbb5b1582d771dcad5c452c09d673f6bcfd7d3d5deffa869787dc38ea2a62726c85b079856ea2e444f6b86755823dd505c9941db0b9c5

    • SSDEEP

      3072:vcf+u4HhwG5A7kJUjc/8JTAf5NRj/BtWsaeEaUsFGWGLorDfxVi67zq44r:vBOGu7yf5LVtufcVDpj7zqn

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks