General

  • Target

    dc6yuusd.exe

  • Size

    360KB

  • Sample

    201123-ex3wblszyx

  • MD5

    c966ec47c0480c3a6be2a1231a83c8a1

  • SHA1

    b15e12449be1ea174dfd224935fa6d78e1c58f5a

  • SHA256

    4b1f2c18b149fd0e878c362ffba50bb553d7bea93a795b33e398d032dc0b7663

  • SHA512

    35b3b6e9aebaa447f2cbf6a9fb7d24985475870285c6ea1bde7b8ccfd3ea956761691e44103d391ec89d8af6f43d73627a09c1c36b19f24caeab1453edd69f5e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://penodux.com/xsmkld/index.php

http://tommusikirtyur.com/xsmkld/index.php

http://ploaernysannyer.com/xsmkld/index.php

http://dersmasfannyer.com/xsmkld/index.php

http://derdsgdannyer.com/xsmkld/index.php

rc4.i32
rc4.i32

Extracted

Family

dridex

Botnet

10444

C2

175.126.167.148:443

173.249.20.233:8043

162.241.204.233:4443

138.122.143.40:8043

rc4.plain
rc4.plain

Targets

    • Target

      dc6yuusd.exe

    • Size

      360KB

    • MD5

      c966ec47c0480c3a6be2a1231a83c8a1

    • SHA1

      b15e12449be1ea174dfd224935fa6d78e1c58f5a

    • SHA256

      4b1f2c18b149fd0e878c362ffba50bb553d7bea93a795b33e398d032dc0b7663

    • SHA512

      35b3b6e9aebaa447f2cbf6a9fb7d24985475870285c6ea1bde7b8ccfd3ea956761691e44103d391ec89d8af6f43d73627a09c1c36b19f24caeab1453edd69f5e

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks