Unrthppaf.bin

General
Target

Unrthppaf.bin.dll

Filesize

426KB

Completed

26-11-2020 07:51

Score
10 /10
MD5

2b47214db606e21fb5d58cc7c3a27242

SHA1

8b71bd0a2618d26a16a85245e7a92aef6d3da967

SHA256

b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

Malware Config

Extracted

Family dridex
Botnet 10555
C2

194.225.58.216:443

178.254.40.132:691

216.172.165.70:3889

198.57.200.100:3786

rc4.plain
rc4.plain
Signatures 3

Filter: none

  • Dridex

    Description

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader

    Description

    Detects Dridex both x86 and x64 loader in memory.

    Reported IOCs

    resourceyara_rule
    behavioral2/memory/1004-1-0x0000000002F40000-0x0000000002F7D000-memory.dmpdridex_ldr
  • Suspicious use of WriteProcessMemory
    rundll32.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 492 wrote to memory of 1004492rundll32.exerundll32.exe
    PID 492 wrote to memory of 1004492rundll32.exerundll32.exe
    PID 492 wrote to memory of 1004492rundll32.exerundll32.exe
Processes 2
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Unrthppaf.bin.dll,#1
    Suspicious use of WriteProcessMemory
    PID:492
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Unrthppaf.bin.dll,#1
      PID:1004
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/1004-0-0x0000000000000000-mapping.dmp

                          • memory/1004-1-0x0000000002F40000-0x0000000002F7D000-memory.dmp