General

  • Target

    Copy_#_824.xls

  • Size

    707KB

  • Sample

    210114-ffet2qky3a

  • MD5

    36e8e3ce267eed9890d07b45b339a71b

  • SHA1

    47e662c6d5041836ba207ad2e6ed22a99ca1a4da

  • SHA256

    7bebb1f39af44412c5a7d8263d4fdae5ec1f234ad2f96e6f07add6daa3ce9b0a

  • SHA512

    af22f3d08e86f3b97f0169f3ceeed46dd0cfb027d761c9b9b6589e2b8b2990a63d1ac3a40d1dcb0b0d4b2f7a2df16e898e66d158b00e567d37699f572fc6d9f3

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Copy_#_824.xls

    • Size

      707KB

    • MD5

      36e8e3ce267eed9890d07b45b339a71b

    • SHA1

      47e662c6d5041836ba207ad2e6ed22a99ca1a4da

    • SHA256

      7bebb1f39af44412c5a7d8263d4fdae5ec1f234ad2f96e6f07add6daa3ce9b0a

    • SHA512

      af22f3d08e86f3b97f0169f3ceeed46dd0cfb027d761c9b9b6589e2b8b2990a63d1ac3a40d1dcb0b0d4b2f7a2df16e898e66d158b00e567d37699f572fc6d9f3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks