General

  • Target

    Report 290.xls

  • Size

    730KB

  • Sample

    210114-tdc452exa2

  • MD5

    59539fde938ac6da898bd587f1850c96

  • SHA1

    2fb5d4ffe1a88cffe59463ac2e7e3996574b1556

  • SHA256

    137bdd679664e951ea9c919cb447b64d6d24251c406350e78471c1d589f12706

  • SHA512

    2ba1a2c5063a7bdab49c4c4f54d637658fe627b4150e0878cdae469811d3a289b6ac07aa7fd7eb02b27ebb64c4e2461712be6b116bba41fdba1e042d1bd2c3b9

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Report 290.xls

    • Size

      730KB

    • MD5

      59539fde938ac6da898bd587f1850c96

    • SHA1

      2fb5d4ffe1a88cffe59463ac2e7e3996574b1556

    • SHA256

      137bdd679664e951ea9c919cb447b64d6d24251c406350e78471c1d589f12706

    • SHA512

      2ba1a2c5063a7bdab49c4c4f54d637658fe627b4150e0878cdae469811d3a289b6ac07aa7fd7eb02b27ebb64c4e2461712be6b116bba41fdba1e042d1bd2c3b9

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks