Analysis

  • max time kernel
    31s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-03-2021 19:08

General

  • Target

    a2599ff27e255a199db7c526b2973cdee7cdea22b852b2074157c3d0a0b7dfcc.dll

  • Size

    188KB

  • MD5

    555869311347b1235f50d7054cdb8180

  • SHA1

    0df5edb8d34be9f95960c55f652123451c079f72

  • SHA256

    a2599ff27e255a199db7c526b2973cdee7cdea22b852b2074157c3d0a0b7dfcc

  • SHA512

    dafe2e510b2f2f3f82df08d94bce77806ec6b206e8c9b86209dd86e65a2e30cb98994568881e5f59554cf8546f01a692b4406219ffed91ffb448d3d2a800dc1f

Malware Config

Extracted

Family

dridex

Botnet

111

C2

116.251.211.158:443

216.10.242.142:6601

37.247.35.137:6601

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a2599ff27e255a199db7c526b2973cdee7cdea22b852b2074157c3d0a0b7dfcc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a2599ff27e255a199db7c526b2973cdee7cdea22b852b2074157c3d0a0b7dfcc.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Checks whether UAC is enabled
      PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-7-0x000007FEF6B90000-0x000007FEF6E0A000-memory.dmp

    Filesize

    2.5MB

  • memory/1688-2-0x0000000000000000-mapping.dmp

  • memory/1688-3-0x0000000075C31000-0x0000000075C33000-memory.dmp

    Filesize

    8KB

  • memory/1688-4-0x00000000754A0000-0x00000000754D1000-memory.dmp

    Filesize

    196KB

  • memory/1688-5-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/1688-6-0x00000000754A0000-0x00000000754BF000-memory.dmp

    Filesize

    124KB