General

  • Target

    Information 714353.xls

  • Size

    698KB

  • Sample

    210114-lqrpwn7xee

  • MD5

    cfb9c19b6be349c52e5d0d001f03ea85

  • SHA1

    ec9d80d0d794643988faa894e25f9aa3345f45f4

  • SHA256

    bae3d678224e6e93b486c9cc1c6918c7efd715b841f5cfa8e8c63cf520adbe9c

  • SHA512

    2ca9676dca76918a0bf4f85607a27914a9405081c621ad03d483495c4653e8075c46fb48cd0b1b5c9b58247d0b8136e7e539cf6acca740d9c329f8f3e395303c

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Information 714353.xls

    • Size

      698KB

    • MD5

      cfb9c19b6be349c52e5d0d001f03ea85

    • SHA1

      ec9d80d0d794643988faa894e25f9aa3345f45f4

    • SHA256

      bae3d678224e6e93b486c9cc1c6918c7efd715b841f5cfa8e8c63cf520adbe9c

    • SHA512

      2ca9676dca76918a0bf4f85607a27914a9405081c621ad03d483495c4653e8075c46fb48cd0b1b5c9b58247d0b8136e7e539cf6acca740d9c329f8f3e395303c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks