General

  • Target

    265666_BOL.xlsm

  • Size

    35KB

  • Sample

    210315-15rwg27zde

  • MD5

    a9571044e94878cf4f9799c033305fb8

  • SHA1

    86429d5ad991da1773fe4f485f7eea142ab5f00a

  • SHA256

    74a551c38c3165128be5e8c58766a1c57d38b7183f6c9977cd1eeadce159a00f

  • SHA512

    dad015bffb5d383139f462f6b55de7e3d7844d8bbf65d9a542e41b7489e404b3d22f89508f022d97a61875ecbeeae0918b91d9023a5a5cecc69ff1fdb246bdac

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

210.65.244.184:443

147.78.186.4:10051

62.75.168.152:6601

rc4.plain
rc4.plain

Targets

    • Target

      265666_BOL.xlsm

    • Size

      35KB

    • MD5

      a9571044e94878cf4f9799c033305fb8

    • SHA1

      86429d5ad991da1773fe4f485f7eea142ab5f00a

    • SHA256

      74a551c38c3165128be5e8c58766a1c57d38b7183f6c9977cd1eeadce159a00f

    • SHA512

      dad015bffb5d383139f462f6b55de7e3d7844d8bbf65d9a542e41b7489e404b3d22f89508f022d97a61875ecbeeae0918b91d9023a5a5cecc69ff1fdb246bdac

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks