General

  • Target

    Unrthppaf.bin

  • Size

    426KB

  • Sample

    201126-nqtqj5q93a

  • MD5

    2b47214db606e21fb5d58cc7c3a27242

  • SHA1

    8b71bd0a2618d26a16a85245e7a92aef6d3da967

  • SHA256

    b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

  • SHA512

    908057911bc6458f608700814b65be5706825314181f54ca42bd3745dd856cdee85a7b39a5d6f7c57e3203951e4c86578ad4079bfd1d5189a876c714c984c8fe

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

194.225.58.216:443

178.254.40.132:691

216.172.165.70:3889

198.57.200.100:3786

rc4.plain
rc4.plain

Targets

    • Target

      Unrthppaf.bin

    • Size

      426KB

    • MD5

      2b47214db606e21fb5d58cc7c3a27242

    • SHA1

      8b71bd0a2618d26a16a85245e7a92aef6d3da967

    • SHA256

      b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

    • SHA512

      908057911bc6458f608700814b65be5706825314181f54ca42bd3745dd856cdee85a7b39a5d6f7c57e3203951e4c86578ad4079bfd1d5189a876c714c984c8fe

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks