General

  • Target

    Contract_#_599848.xls

  • Size

    815KB

  • Sample

    210114-83xfy3cvwa

  • MD5

    82ee594ab9d12d0a00bf399beb7f4e1f

  • SHA1

    5b58a1fefd63ca221b0eeca61b9378db25ae0eb1

  • SHA256

    05b9806f446c71ca46bbddc10176bf28838430bbecb9545cc730fdb93b205476

  • SHA512

    78b80fc1780c51f827ee6f71111b3b037ef0605cbe364b039e7746f6704759f9b1f2c725e7e5869bedf0a11dc9d41d21a9d527f8b2cffcd222818f7ac8651cc5

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Contract_#_599848.xls

    • Size

      815KB

    • MD5

      82ee594ab9d12d0a00bf399beb7f4e1f

    • SHA1

      5b58a1fefd63ca221b0eeca61b9378db25ae0eb1

    • SHA256

      05b9806f446c71ca46bbddc10176bf28838430bbecb9545cc730fdb93b205476

    • SHA512

      78b80fc1780c51f827ee6f71111b3b037ef0605cbe364b039e7746f6704759f9b1f2c725e7e5869bedf0a11dc9d41d21a9d527f8b2cffcd222818f7ac8651cc5

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks