General

  • Target

    32df734f1b509ef75e7815eed132643506a75ae69608b194ea99c435e0f3c1b3.exe

  • Size

    366KB

  • Sample

    250120-lrp8lstldk

  • MD5

    784c53923ecb92ffa0e0bffae6e5373d

  • SHA1

    b1ec5ed63a82efbd1249d4c6b77cfe2ce0b2ae8d

  • SHA256

    32df734f1b509ef75e7815eed132643506a75ae69608b194ea99c435e0f3c1b3

  • SHA512

    5661cea019dbc7b9ea003f14d0d361e6d2dd85889324f8fcbc897bb569a37f1a36dbc3a57d14237e646e9b16342636ed7a77c8fb7ab154c1cd278bc6dd234af3

  • SSDEEP

    6144:DuUfyIrWsUujF7DpzIhDyacsEv6P8xWWzH:aUaIrWPupJIheacsb0zH

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

87.98.218.33:443

54.38.143.246:691

92.38.128.47:3389

159.65.79.173:3886

rc4.plain
rc4.plain

Targets

    • Target

      32df734f1b509ef75e7815eed132643506a75ae69608b194ea99c435e0f3c1b3.exe

    • Size

      366KB

    • MD5

      784c53923ecb92ffa0e0bffae6e5373d

    • SHA1

      b1ec5ed63a82efbd1249d4c6b77cfe2ce0b2ae8d

    • SHA256

      32df734f1b509ef75e7815eed132643506a75ae69608b194ea99c435e0f3c1b3

    • SHA512

      5661cea019dbc7b9ea003f14d0d361e6d2dd85889324f8fcbc897bb569a37f1a36dbc3a57d14237e646e9b16342636ed7a77c8fb7ab154c1cd278bc6dd234af3

    • SSDEEP

      6144:DuUfyIrWsUujF7DpzIhDyacsEv6P8xWWzH:aUaIrWPupJIheacsb0zH

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

MITRE ATT&CK Enterprise v15

Tasks