General

  • Target

    Notification #591501.xls

  • Size

    790KB

  • Sample

    210114-1lqfzsgq7s

  • MD5

    e004ebdc104e70001d0d1453ccbbf7a8

  • SHA1

    35f4b94344109eb3245c653277e3b41e0d5277de

  • SHA256

    1920c8c809d225ed5239f9aa0c510148a6b292d639e9d2ab13146129d255f3c1

  • SHA512

    2404f047e176aefd57234009a588c01b97ac263ebefc06a3e55e55ea13267eceb5b00b0a62a643701b23d06f77f529b80a11801c08e283210b25594a00489e9a

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Notification #591501.xls

    • Size

      790KB

    • MD5

      e004ebdc104e70001d0d1453ccbbf7a8

    • SHA1

      35f4b94344109eb3245c653277e3b41e0d5277de

    • SHA256

      1920c8c809d225ed5239f9aa0c510148a6b292d639e9d2ab13146129d255f3c1

    • SHA512

      2404f047e176aefd57234009a588c01b97ac263ebefc06a3e55e55ea13267eceb5b00b0a62a643701b23d06f77f529b80a11801c08e283210b25594a00489e9a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks