Analysis

  • max time kernel
    60s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    07-02-2021 18:25

General

  • Target

    f045bc5d0dc4890be3163fa236c403dab3d444e92fd5ddc0356dbf3f25f829af.dll

  • Size

    830KB

  • MD5

    8c1c54884b90c015330ef19c0cb0a4fc

  • SHA1

    e222675107a78e19648479a3a994f63fcc58f2a2

  • SHA256

    f045bc5d0dc4890be3163fa236c403dab3d444e92fd5ddc0356dbf3f25f829af

  • SHA512

    bf4cbee52dfe8c7dd5ab33a8b8e121d9d9cc92b2ebf720026dc3dd4e48f16bb8a5c0970cf7a4dc18b547c3ed4632ae48b1628f46c85436d0dc947baaf886b4e3

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

146.164.126.197:443

69.16.193.166:9443

193.90.12.122:3098

157.245.103.132:14043

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Dridex Loader 'dmod' strings 2 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f045bc5d0dc4890be3163fa236c403dab3d444e92fd5ddc0356dbf3f25f829af.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f045bc5d0dc4890be3163fa236c403dab3d444e92fd5ddc0356dbf3f25f829af.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Checks whether UAC is enabled
      PID:1920

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1452-7-0x000007FEF7510000-0x000007FEF778A000-memory.dmp
    Filesize

    2.5MB

  • memory/1920-2-0x0000000000000000-mapping.dmp
  • memory/1920-3-0x00000000760D1000-0x00000000760D3000-memory.dmp
    Filesize

    8KB

  • memory/1920-4-0x0000000073F00000-0x0000000073F3A000-memory.dmp
    Filesize

    232KB

  • memory/1920-5-0x0000000073F00000-0x0000000073F3A000-memory.dmp
    Filesize

    232KB

  • memory/1920-6-0x0000000000160000-0x0000000000161000-memory.dmp
    Filesize

    4KB