Advertisement
ExecuteMalware

2021-04-19 Dridex IOCs

Apr 19th, 2021
16,102
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.11 KB | None | 0 0
  1. THREAT IDENTIFICATION: DRIDEX
  2.  
  3. SENDER EMAILS
  4.  
  5. SUBJECTS
  6. Reminder: Invoice 714873
  7.  
  8. MALDOC FILE HASHES
  9. 714873.xls
  10. 5c3a1b785f532a889980751123e3ffce
  11.  
  12. PAYLOAD DOWNLOAD URLS
  13. https://vegasvulkangermany.veronafoodbd.com/nteqdu5.rar
  14. https://sydwaltcrmfrontend.khholdings.co.za/d5mvar80.zip
  15.  
  16. PAYLOAD FILE HASHES
  17. nteqdu5.rar
  18. 340994098deb6bf6fa91f73350af7c15
  19.  
  20. Renamed to:
  21. trtsivqq.dll
  22. 340994098deb6bf6fa91f73350af7c15
  23.  
  24. Also:
  25. d5mvar80.zip
  26. 17d87654aea66ba8a0d416be95fac1b4
  27.  
  28. DRIDEX C2
  29. https://146.185.170.249/
  30. https://62.75.251.60:6601/
  31. https://185.148.168.25:2303/
  32.  
  33. EMAIL BODY
  34. Your invoice is attached. Please remit payment at your earliest convenience.
  35.  
  36. Thanks for your business!
  37. INVOICE 714873
  38. DUE 04/19/2021
  39. $1,330.00
  40. Review and pay
  41. Powered by QuickBooks
  42. If you receive an email that seems fraudulent, please check with the business owner before paying.
  43.  
  44. © Intuit, Inc. All rights reserved. Privacy | Security | Terms of Service
  45.  
  46. SUPORTING EVIDENCE
  47. https://www.virustotal.com/gui/file/da81aa0dd37baccdbdc7f7f9a3619d6e85155f8bd67fcd2fafdbe534443fdc0c/community
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement