General

  • Target

    e6693aaefd90d4c1334458d59ee3fcf4a3a9c4b4042647655665e7ffc503a729

  • Size

    1.1MB

  • Sample

    250205-jrmrdaxlcw

  • MD5

    3f8b2099ac091205291acd011520de3a

  • SHA1

    68ca4bcd1f4381c1b10aa4a8bcea23da1fc45d45

  • SHA256

    e6693aaefd90d4c1334458d59ee3fcf4a3a9c4b4042647655665e7ffc503a729

  • SHA512

    9d096b4410769ea30cad2a79be6d794e3936cb07f4ffbc113860290b94dd62601fdf4f9dda8e8c55bef150843d7bd299040d4914a87eae181de8634c200ea32e

  • SSDEEP

    3072:6zW15DVagWq7Y+jbkGenScL1FsrKY/gnl4PNN0Bi3434YFOmOXoHOZNxjRIpzWMM:lVCqel7oe4nmOXouZq0XJa5Ga

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

162.241.44.26:9443

185.184.25.234:4664

138.201.138.91:3389

rc4.plain
rc4.plain

Targets

    • Target

      e6693aaefd90d4c1334458d59ee3fcf4a3a9c4b4042647655665e7ffc503a729

    • Size

      1.1MB

    • MD5

      3f8b2099ac091205291acd011520de3a

    • SHA1

      68ca4bcd1f4381c1b10aa4a8bcea23da1fc45d45

    • SHA256

      e6693aaefd90d4c1334458d59ee3fcf4a3a9c4b4042647655665e7ffc503a729

    • SHA512

      9d096b4410769ea30cad2a79be6d794e3936cb07f4ffbc113860290b94dd62601fdf4f9dda8e8c55bef150843d7bd299040d4914a87eae181de8634c200ea32e

    • SSDEEP

      3072:6zW15DVagWq7Y+jbkGenScL1FsrKY/gnl4PNN0Bi3434YFOmOXoHOZNxjRIpzWMM:lVCqel7oe4nmOXouZq0XJa5Ga

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks