General

  • Target

    Rep #226186.xls

  • Size

    852KB

  • Sample

    210114-n2ad8e8eca

  • MD5

    0f2bf8e4e3e5c913f80b107afb512a92

  • SHA1

    4253b6482fc02873f319c9f154d2b25af73744f2

  • SHA256

    1e98e612249a70213c5962fa546f54ac53eed8002597b03a2a9de4cc64ca5399

  • SHA512

    7cd396aa24a4f6ac5383ed6cc78be7928d672961f346ffb8df6ddb69ebdfec075c92218b531a0f40c1f84e7c68dbab29b8d56bd49c02660dfff15bd2b85dc2b6

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Rep #226186.xls

    • Size

      852KB

    • MD5

      0f2bf8e4e3e5c913f80b107afb512a92

    • SHA1

      4253b6482fc02873f319c9f154d2b25af73744f2

    • SHA256

      1e98e612249a70213c5962fa546f54ac53eed8002597b03a2a9de4cc64ca5399

    • SHA512

      7cd396aa24a4f6ac5383ed6cc78be7928d672961f346ffb8df6ddb69ebdfec075c92218b531a0f40c1f84e7c68dbab29b8d56bd49c02660dfff15bd2b85dc2b6

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks