Analysis

  • max time kernel
    110s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-11-2020 16:39

General

  • Target

    Qdfo3phy.dll

  • Size

    668KB

  • MD5

    e16a166beb4c710daa177c316febf54c

  • SHA1

    4f2c2e15fbf3b683bc0dfe38353d2f7eee8632a4

  • SHA256

    4ef049a69d2343a538b8563388f2a9f6838e8e864c6738b1e4934a4e377369a9

  • SHA512

    1808ce32bdc372e464a0c8567b476d6a19eac45c187affc3216bdd98d3f7374fce64c2589e8de84cf4781638cd1f0026148b69358cc33327653d2432ce25ccb5

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

195.154.237.245:443

46.105.131.73:8172

91.238.160.158:18443

213.183.128.99:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Qdfo3phy.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Qdfo3phy.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Checks whether UAC is enabled
      PID:1644

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/844-2-0x000007FEF7160000-0x000007FEF73DA000-memory.dmp
    Filesize

    2.5MB

  • memory/1644-0-0x0000000000000000-mapping.dmp
  • memory/1644-1-0x00000000746C0000-0x00000000746FD000-memory.dmp
    Filesize

    244KB