Documentation.478396766.doc

General
Target

Documentation.478396766.doc

Size

116KB

Sample

201119-3z863g7932

Score
10 /10
MD5

e12004b1f374e47e4e63797096854321

SHA1

b3c2d856499174992dc5c13738991875bc9cc08c

SHA256

8921b2421d4fde9e229bdda0da89a5bd10023a9f9d2529f2fb2da9c5e1a060c6

SHA512

4e40379df93194528cb7de413861b0b1416b5d2adc6232b2cf101e18fba06843e481101f3ef651590e06a140348ace0a321b1a0639f389b5a93298d55c21c3c2

Malware Config

Extracted

Language ps1
Deobfuscated
URLs
exe.dropper

http://veva.vn/zntk070.png

exe.dropper

http://hardmed-eg.com/o76nxa.png

exe.dropper

http://islamabout.com/ga140h7l.zip

exe.dropper

http://ferretec.com/c2eivsswg.rar

exe.dropper

http://rasadbar.ir/t6yswb.pdf

exe.dropper

http://seniorcarecompass.inifaresworkshops.com/vr6ebzold.png

Extracted

Family dridex
Botnet 10555
C2

162.241.44.26:9443

192.232.229.53:4443

77.220.64.34:443

193.90.12.121:3098

rc4.plain
rc4.plain
Targets
Target

Documentation.478396766.doc

MD5

e12004b1f374e47e4e63797096854321

Filesize

116KB

Score
10 /10
SHA1

b3c2d856499174992dc5c13738991875bc9cc08c

SHA256

8921b2421d4fde9e229bdda0da89a5bd10023a9f9d2529f2fb2da9c5e1a060c6

SHA512

4e40379df93194528cb7de413861b0b1416b5d2adc6232b2cf101e18fba06843e481101f3ef651590e06a140348ace0a321b1a0639f389b5a93298d55c21c3c2

Tags

Signatures

  • Dridex

    Description

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    Tags

  • Process spawned unexpected child process

    Description

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader

    Description

    Detects Dridex both x86 and x64 loader in memory.

    Tags

  • Blocklisted process makes network request

  • Loads dropped DLL

  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery
  • Drops file in System32 directory

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation