Resubmissions

18-11-2020 16:55

201118-se861xnrva 10

16-11-2020 11:25

201116-szw4la68y6 10

General

  • Target

    https://tracker.usemoney.xyz/zero?cep=0INPp9du4Bhy2Xz68yYOO6a5ujZtlV9xjhCnT4cUZDhJTx-jvv2D7Xi7jVwUhpJlo52vu4233Dm8ltmYLtJBfRge5Y4P62wXpwlT5acD4EDeDh7SM9D2zGMogvUYSihxAPb3O-SGVz12pJSSOF_GkBl1TKhEvSdp2oFvg7mVhJ0JNv3-cJSDfq9kxqE8b3I2YY5ooRjr2_qD7697Z8O4qWS9CvsZsz3GdP2JCZHBd6eW1OW2yHbz1qmvA2USlnAwDkR7WL6G3w4S4IuDzYz8FzCYvEWcPp7pgD3Dt6xrsNTTCyeKXpNBsDVCSIMJ9La8Hv-IXSYDztDY64Kx35t8o7h5Bl2a5jQ9ggtADAWfMvI

  • Sample

    201116-szw4la68y6

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

194.150.118.7:443

49.212.179.180:3889

69.64.62.4:4443

rc4.plain
rc4.plain

Targets

    • Target

      https://tracker.usemoney.xyz/zero?cep=0INPp9du4Bhy2Xz68yYOO6a5ujZtlV9xjhCnT4cUZDhJTx-jvv2D7Xi7jVwUhpJlo52vu4233Dm8ltmYLtJBfRge5Y4P62wXpwlT5acD4EDeDh7SM9D2zGMogvUYSihxAPb3O-SGVz12pJSSOF_GkBl1TKhEvSdp2oFvg7mVhJ0JNv3-cJSDfq9kxqE8b3I2YY5ooRjr2_qD7697Z8O4qWS9CvsZsz3GdP2JCZHBd6eW1OW2yHbz1qmvA2USlnAwDkR7WL6G3w4S4IuDzYz8FzCYvEWcPp7pgD3Dt6xrsNTTCyeKXpNBsDVCSIMJ9La8Hv-IXSYDztDY64Kx35t8o7h5Bl2a5jQ9ggtADAWfMvI

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks