General

  • Target

    Subconract_1541.xls

  • Size

    805KB

  • Sample

    210114-7jczrbyez6

  • MD5

    90501b4eda1eaacd5773c77717050e51

  • SHA1

    31a5e6dab54af69ff3991af5f3c2e8fc83daf975

  • SHA256

    0b110be9ae7f5755dad4e964cd94566a0252586a000feb669c5dd75b2307b214

  • SHA512

    dbc8a965d20aa95e9e3bfde5abcc274ef08b5210e5432f940ce2446a244b2eef19cb216bb4799537e39e6000b1083256cac7e64938a938fe09c6471fe557adf3

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Subconract_1541.xls

    • Size

      805KB

    • MD5

      90501b4eda1eaacd5773c77717050e51

    • SHA1

      31a5e6dab54af69ff3991af5f3c2e8fc83daf975

    • SHA256

      0b110be9ae7f5755dad4e964cd94566a0252586a000feb669c5dd75b2307b214

    • SHA512

      dbc8a965d20aa95e9e3bfde5abcc274ef08b5210e5432f940ce2446a244b2eef19cb216bb4799537e39e6000b1083256cac7e64938a938fe09c6471fe557adf3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks