General

  • Target

    Order_Gift_Card.961396645.doc

  • Size

    112KB

  • Sample

    201126-9jgh78d49n

  • MD5

    7d46d3da88253c6abcc426ce9fb9e3c5

  • SHA1

    8dbd9d1bfe48c59b5704d6275f478e768230c81d

  • SHA256

    9ca6330ecc859154893e48bed53317005670c23c5d58bca8e991177cbb7324e9

  • SHA512

    9a19fa0d30c49384582aeb323a44e13118281e55e26c9de668eebf222862761c4e47cdcfbea6a6e6eb2a93d436af16989d4f42870ae1dfa5b7c0e015b52be559

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://burstner.clabris.se/ucjk7st.zip

exe.dropper

http://bespokeweddings.ie/k1c8dh4.rar

exe.dropper

https://conjurosdeamoryhechiceriaacacio.com/tjbdhdvi1.zip

exe.dropper

https://keitauniv.keita.ae/wchfvdsd7.rar

exe.dropper

https://cms.keita.ae/h0mqrz.rar

exe.dropper

https://airbornegroup.net/y461xrm.zip

exe.dropper

https://phones.pmrspain.com/xzeoxn8.rar

exe.dropper

http://oya.qa/lfonl5.rar

Extracted

Family

dridex

Botnet

10555

C2

194.225.58.216:443

178.254.40.132:691

216.172.165.70:3889

198.57.200.100:3786

rc4.plain
rc4.plain

Targets

    • Target

      Order_Gift_Card.961396645.doc

    • Size

      112KB

    • MD5

      7d46d3da88253c6abcc426ce9fb9e3c5

    • SHA1

      8dbd9d1bfe48c59b5704d6275f478e768230c81d

    • SHA256

      9ca6330ecc859154893e48bed53317005670c23c5d58bca8e991177cbb7324e9

    • SHA512

      9a19fa0d30c49384582aeb323a44e13118281e55e26c9de668eebf222862761c4e47cdcfbea6a6e6eb2a93d436af16989d4f42870ae1dfa5b7c0e015b52be559

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks