General

  • Target

    Order_Gift_Card_411022863.doc

  • Size

    112KB

  • Sample

    201126-b1lvw4dgca

  • MD5

    07faf71908158870c1e1af97bd89d12d

  • SHA1

    567052f0b8b453932db3e18208990bca12bcc167

  • SHA256

    255327cc966eebcdb52f94414c36920585f2190ae10a9560db5047def717b2ac

  • SHA512

    3acc7099c87cfb54abf823b00839a3c928ae853cf6c83c19bc29a79af4fca45a573f88ac4b60f83698aed718b443d0ec3ac130954b5d0fb71e239b76da6e414d

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://burstner.clabris.se/ucjk7st.zip

exe.dropper

http://bespokeweddings.ie/k1c8dh4.rar

exe.dropper

https://conjurosdeamoryhechiceriaacacio.com/tjbdhdvi1.zip

exe.dropper

https://keitauniv.keita.ae/wchfvdsd7.rar

exe.dropper

https://cms.keita.ae/h0mqrz.rar

exe.dropper

https://airbornegroup.net/y461xrm.zip

exe.dropper

https://phones.pmrspain.com/xzeoxn8.rar

exe.dropper

http://oya.qa/lfonl5.rar

Extracted

Family

dridex

Botnet

10555

C2

194.225.58.216:443

178.254.40.132:691

216.172.165.70:3889

198.57.200.100:3786

rc4.plain
rc4.plain

Targets

    • Target

      Order_Gift_Card_411022863.doc

    • Size

      112KB

    • MD5

      07faf71908158870c1e1af97bd89d12d

    • SHA1

      567052f0b8b453932db3e18208990bca12bcc167

    • SHA256

      255327cc966eebcdb52f94414c36920585f2190ae10a9560db5047def717b2ac

    • SHA512

      3acc7099c87cfb54abf823b00839a3c928ae853cf6c83c19bc29a79af4fca45a573f88ac4b60f83698aed718b443d0ec3ac130954b5d0fb71e239b76da6e414d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks