General

  • Target

    Detailed 079.xls

  • Size

    700KB

  • Sample

    210114-m2673k9s5j

  • MD5

    f701a2158fc4a868d23a084343462fd0

  • SHA1

    ebe1522c21f37590b6e2f2b7a04a79fd52de028f

  • SHA256

    08a4f7ec8149e54ab39741f32f4f877257c5bc3cb1473b7cca0c86b58f0abcf2

  • SHA512

    bcdd7fc4652d5f272480f92b974f3130b72af0923cc0c4299fcb8c2d0fc4acc4b232a0aeff130db902928ba82810804ff894149bfd74de1283e76554fd60f4f0

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Detailed 079.xls

    • Size

      700KB

    • MD5

      f701a2158fc4a868d23a084343462fd0

    • SHA1

      ebe1522c21f37590b6e2f2b7a04a79fd52de028f

    • SHA256

      08a4f7ec8149e54ab39741f32f4f877257c5bc3cb1473b7cca0c86b58f0abcf2

    • SHA512

      bcdd7fc4652d5f272480f92b974f3130b72af0923cc0c4299fcb8c2d0fc4acc4b232a0aeff130db902928ba82810804ff894149bfd74de1283e76554fd60f4f0

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks