General

  • Target

    8e0dc6162e128441f68f305d4a178bc7bf6b2bfe8b068e0f3458588010d55dc9N.exe

  • Size

    366KB

  • Sample

    250121-pea5psspfz

  • MD5

    b9e5bbc8a4474c6d5c8cadd38c8df860

  • SHA1

    160628ec41f747d326e864ee37eef2408cbda1d4

  • SHA256

    8e0dc6162e128441f68f305d4a178bc7bf6b2bfe8b068e0f3458588010d55dc9

  • SHA512

    d2361cf100642e88377a89ee08f2049c3f5616feb7bc36a915157e9b9c00b1dd2aa12df3790dc860a52cdedd499788c04e29cb553970890145b393e5c74a9f5a

  • SSDEEP

    6144:DuUfyIrWsUujF7DpzIhDyacsEv6P8xWWzv:aUaIrWPupJIheacsb0zv

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

87.98.218.33:443

54.38.143.246:691

92.38.128.47:3389

159.65.79.173:3886

rc4.plain
rc4.plain

Targets

    • Target

      8e0dc6162e128441f68f305d4a178bc7bf6b2bfe8b068e0f3458588010d55dc9N.exe

    • Size

      366KB

    • MD5

      b9e5bbc8a4474c6d5c8cadd38c8df860

    • SHA1

      160628ec41f747d326e864ee37eef2408cbda1d4

    • SHA256

      8e0dc6162e128441f68f305d4a178bc7bf6b2bfe8b068e0f3458588010d55dc9

    • SHA512

      d2361cf100642e88377a89ee08f2049c3f5616feb7bc36a915157e9b9c00b1dd2aa12df3790dc860a52cdedd499788c04e29cb553970890145b393e5c74a9f5a

    • SSDEEP

      6144:DuUfyIrWsUujF7DpzIhDyacsEv6P8xWWzv:aUaIrWPupJIheacsb0zv

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

MITRE ATT&CK Enterprise v15

Tasks