5079661076578304.zip

General
Target

ffd6ae5e716b2cade6d3365fb9440a5a67f37d3c249d78bdea9e5ef3d39ce52c.exe

Filesize

1MB

Completed

17-02-2021 04:43

Score
10 /10
MD5

86954f76b5c0fbb1cb6ea492711869e2

SHA1

081e3460fc0c6e6e6cd1b17b4a8f6b949a88db02

SHA256

ffd6ae5e716b2cade6d3365fb9440a5a67f37d3c249d78bdea9e5ef3d39ce52c

Malware Config

Extracted

Family dridex
Botnet 10111
C2

188.165.17.91:8443

185.216.27.185:8172

182.254.209.230:6516

rc4.plain
rc4.plain
Signatures 4

Filter: none

Discovery
  • Dridex

    Description

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader

    Description

    Detects Dridex both x86 and x64 loader in memory.

    Reported IOCs

    resourceyara_rule
    behavioral2/memory/636-2-0x0000000000400000-0x000000000043D000-memory.dmpdridex_ldr
    behavioral2/memory/636-4-0x0000000000400000-0x000000000043D000-memory.dmpdridex_ldr
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Checks whether UAC is enabled
    ffd6ae5e716b2cade6d3365fb9440a5a67f37d3c249d78bdea9e5ef3d39ce52c.exe

    TTPs

    System Information Discovery

    Reported IOCs

    descriptioniocprocess
    Key value queried\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUAffd6ae5e716b2cade6d3365fb9440a5a67f37d3c249d78bdea9e5ef3d39ce52c.exe
Processes 1
  • C:\Users\Admin\AppData\Local\Temp\ffd6ae5e716b2cade6d3365fb9440a5a67f37d3c249d78bdea9e5ef3d39ce52c.exe
    "C:\Users\Admin\AppData\Local\Temp\ffd6ae5e716b2cade6d3365fb9440a5a67f37d3c249d78bdea9e5ef3d39ce52c.exe"
    Checks whether UAC is enabled
    PID:636
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Replay Monitor
                        00:00 00:00
                        Downloads
                        • memory/636-2-0x0000000000400000-0x000000000043D000-memory.dmp

                        • memory/636-3-0x00000000007C0000-0x00000000007FC000-memory.dmp

                        • memory/636-4-0x0000000000400000-0x000000000043D000-memory.dmp