General

  • Target

    Report_#_301.xls

  • Size

    814KB

  • Sample

    210114-cnmrktc4ss

  • MD5

    08b8f5fdfe51f4c656e8fb00c78a1e71

  • SHA1

    3313966cbebfaf302ae2e260b0432b8ed735f39d

  • SHA256

    2f99f137ccfabdc69cfbffb4805a07cf53310271e627b4f2f2291dc9b9afb5fd

  • SHA512

    a0861dd49296f90cc6f1836ea3d8efdcf09b49b4ca6f344417de2ab1ff1f52474f0c13cbbbbddb531c39194b680e6a3f5ae00ab2204ee2310a18a30fd52b038f

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Report_#_301.xls

    • Size

      814KB

    • MD5

      08b8f5fdfe51f4c656e8fb00c78a1e71

    • SHA1

      3313966cbebfaf302ae2e260b0432b8ed735f39d

    • SHA256

      2f99f137ccfabdc69cfbffb4805a07cf53310271e627b4f2f2291dc9b9afb5fd

    • SHA512

      a0861dd49296f90cc6f1836ea3d8efdcf09b49b4ca6f344417de2ab1ff1f52474f0c13cbbbbddb531c39194b680e6a3f5ae00ab2204ee2310a18a30fd52b038f

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks