General

  • Target

    Reports_6633.xls

  • Size

    797KB

  • Sample

    210114-afj59v96fx

  • MD5

    70582dd298a2785233bdc58ef6ebf124

  • SHA1

    385ab29a95d5bd46981a3d4b11fe42c2c50059ae

  • SHA256

    861f0ff89dfec337fe08a17a305020ef1b7d27efb4c367793138561020cd93f8

  • SHA512

    d3f692e868cc0990d518a587a474747c286e97fec06960d0a9f088d8741f7e0592105450836c282583c5dc6bc2a60fbfd17034ffa0c1988633b27a103fab9b73

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Reports_6633.xls

    • Size

      797KB

    • MD5

      70582dd298a2785233bdc58ef6ebf124

    • SHA1

      385ab29a95d5bd46981a3d4b11fe42c2c50059ae

    • SHA256

      861f0ff89dfec337fe08a17a305020ef1b7d27efb4c367793138561020cd93f8

    • SHA512

      d3f692e868cc0990d518a587a474747c286e97fec06960d0a9f088d8741f7e0592105450836c282583c5dc6bc2a60fbfd17034ffa0c1988633b27a103fab9b73

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks