General

  • Target

    Notification_836524.xls

  • Size

    786KB

  • Sample

    210114-bm685v8sgs

  • MD5

    47bd6588a26043dcb77e978040e59f9a

  • SHA1

    6d59c226abfdb88e1f4fb28dc0f1bc4ff27bb836

  • SHA256

    bd8b55be218cee85920be13f7e1fbc2b68ac4aa473f8ccc75a2dc815dbfec0b1

  • SHA512

    f5815fea3eea049f3896b19af7d207dd5b030b5c34b025cf0a86108bc8d8d982e5d79be3ba564ed3965110024fc4aca60d3c5a0fa332095e1a701f70f47ae985

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Notification_836524.xls

    • Size

      786KB

    • MD5

      47bd6588a26043dcb77e978040e59f9a

    • SHA1

      6d59c226abfdb88e1f4fb28dc0f1bc4ff27bb836

    • SHA256

      bd8b55be218cee85920be13f7e1fbc2b68ac4aa473f8ccc75a2dc815dbfec0b1

    • SHA512

      f5815fea3eea049f3896b19af7d207dd5b030b5c34b025cf0a86108bc8d8d982e5d79be3ba564ed3965110024fc4aca60d3c5a0fa332095e1a701f70f47ae985

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks