General

  • Target

    9ed94544b25b090f7792a9ded142232a9decebca664a9e534f9540adf070bd3c.zip

  • Size

    574KB

  • Sample

    250326-1k4jzsttbx

  • MD5

    4b2f9980b0ac21d12ae0452955cd6be4

  • SHA1

    06e304804d16c37152d3a14316eabb1f4137b24b

  • SHA256

    9ed94544b25b090f7792a9ded142232a9decebca664a9e534f9540adf070bd3c

  • SHA512

    6d9ef353ef462346abad2b683ef098809fb94dccac4ca1f95ca4bc1bf79279b7d4fa3d1d0fd9f185151c0f6bd79a8131e42d09b8b9e8fba89ba09b7d12f9bb7a

  • SSDEEP

    12288:LD8zHyAGqNiRxJYdAWbSPlBPTrHBgZCJRqC1z9aFv:UWOSxJYdAWbYBPnBDSC1paR

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

209.59.132.241:6601

77.72.145.112:2303

104.238.138.234:4125

rc4.plain
rc4.plain

Targets

    • Target

      e652e4656e036887ef4b145b2eb9bfd92e908889302e42a9ca74e66ed1ac64a7.dll

    • Size

      888KB

    • MD5

      e942ee5d7e6de286de94bf6271de5925

    • SHA1

      cacafb933cafbc01c02f6223f15f647d4e1bab5f

    • SHA256

      e652e4656e036887ef4b145b2eb9bfd92e908889302e42a9ca74e66ed1ac64a7

    • SHA512

      3ad359f5c8bfbdd1f846c85f0bce2c634accc54309bf15263e9db255eb7a205f33221e82be9e865c4d9b623a52d697d449809effcf725c7dd36884bd5399f065

    • SSDEEP

      12288:pTjo1UKnOwSOMjRZbubLKleVahHjlTBwHX5sdNl7tzbrQ/kYljKWsLAZCfyXTq2:BsOdO2RZKqmahBFhlFbBfWssZgyXTq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks