General

  • Target

    INV3853544448-20210315515345.xlsm

  • Size

    40KB

  • Sample

    210315-7l5y58b1ya

  • MD5

    fbdc93eba3d85daa84b15b534d01ad86

  • SHA1

    b60035635c6dabd34f35ed5729df7ada641d51d3

  • SHA256

    6e4dd80fc7a0b4a9ccb96d35ea609227f1e89274b3836f424d9ecbb43791c75d

  • SHA512

    5b777f564c35d04de6faae13993fdad2f6ec2a95c4922488cd47e752b7643f0ea74f43693c8944ba4544fc4eaa4b87fd7196a1c9996c8fd21d166c4f14258a3a

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

210.65.244.184:443

147.78.186.4:10051

62.75.168.152:6601

rc4.plain
rc4.plain

Targets

    • Target

      INV3853544448-20210315515345.xlsm

    • Size

      40KB

    • MD5

      fbdc93eba3d85daa84b15b534d01ad86

    • SHA1

      b60035635c6dabd34f35ed5729df7ada641d51d3

    • SHA256

      6e4dd80fc7a0b4a9ccb96d35ea609227f1e89274b3836f424d9ecbb43791c75d

    • SHA512

      5b777f564c35d04de6faae13993fdad2f6ec2a95c4922488cd47e752b7643f0ea74f43693c8944ba4544fc4eaa4b87fd7196a1c9996c8fd21d166c4f14258a3a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Loads dropped DLL

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks