General

  • Target

    1 Total New Invoices-Thursday January 21 2021.xlsm

  • Size

    30KB

  • Sample

    210121-c211sd3f9a

  • MD5

    a47b6adc87b8000c91a706d3c5ed540f

  • SHA1

    5337c9cd3d3813178bd5e7d1e1334ab973bdbb3f

  • SHA256

    fa8ed75cfc69a06cf1e809531f7371b5c75fd480339ae65568785b76387ceaa0

  • SHA512

    4c703218126a95120b28b5679739eca637700e0847878b83a844f494434f5a05bb3ca739cbe4b8fd45e1fff42d4aaeaa4588a01c4c3f307284c94b1a79eda172

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

dridex

Botnet

10444

C2

194.225.58.214:443

211.110.44.63:5353

69.164.207.140:3388

198.57.200.100:3786

rc4.plain
rc4.plain

Targets

    • Target

      1 Total New Invoices-Thursday January 21 2021.xlsm

    • Size

      30KB

    • MD5

      a47b6adc87b8000c91a706d3c5ed540f

    • SHA1

      5337c9cd3d3813178bd5e7d1e1334ab973bdbb3f

    • SHA256

      fa8ed75cfc69a06cf1e809531f7371b5c75fd480339ae65568785b76387ceaa0

    • SHA512

      4c703218126a95120b28b5679739eca637700e0847878b83a844f494434f5a05bb3ca739cbe4b8fd45e1fff42d4aaeaa4588a01c4c3f307284c94b1a79eda172

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks