General

  • Target

    Inv #147.xls

  • Size

    706KB

  • Sample

    210114-w27m4381d6

  • MD5

    77e05d6f0c417328a50a29af170e1efd

  • SHA1

    3167568a7dcef3faba0a4636ff71f2844d6d8962

  • SHA256

    346a5f545abd67c879755d34f5985f038b30704d97ed59b5597d9dc251336080

  • SHA512

    2ea0153df0240a964e92ef4b5477ed361a20614149f36992496914a89bf3fc5abb582fd3fe4478aa0b6b2c8de6f1d4358aa5baec664f4fa5caf2aa1b841433e1

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Targets

    • Target

      Inv #147.xls

    • Size

      706KB

    • MD5

      77e05d6f0c417328a50a29af170e1efd

    • SHA1

      3167568a7dcef3faba0a4636ff71f2844d6d8962

    • SHA256

      346a5f545abd67c879755d34f5985f038b30704d97ed59b5597d9dc251336080

    • SHA512

      2ea0153df0240a964e92ef4b5477ed361a20614149f36992496914a89bf3fc5abb582fd3fe4478aa0b6b2c8de6f1d4358aa5baec664f4fa5caf2aa1b841433e1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • JavaScript code in executable

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks