General

  • Target

    295323_BOL.xlsm

  • Size

    35KB

  • Sample

    210315-aj242766he

  • MD5

    22c652771b8ce73627adc88d637929cf

  • SHA1

    014cc86b4b1421daa675c34183b7aab2c8fb231b

  • SHA256

    3a08a954b5420702dc1f57733dc238f9977c4dd2041749043ae3e48b36b638c6

  • SHA512

    4d46118b15ec9f052aa091d3f1f33dcff01d95531b2fa69d7fdd4301ae080979d6bec3bfccdd5071570c4c1796e96684012e39912af08fcee443458e6667b778

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

210.65.244.184:443

147.78.186.4:10051

62.75.168.152:6601

rc4.plain
rc4.plain

Targets

    • Target

      295323_BOL.xlsm

    • Size

      35KB

    • MD5

      22c652771b8ce73627adc88d637929cf

    • SHA1

      014cc86b4b1421daa675c34183b7aab2c8fb231b

    • SHA256

      3a08a954b5420702dc1f57733dc238f9977c4dd2041749043ae3e48b36b638c6

    • SHA512

      4d46118b15ec9f052aa091d3f1f33dcff01d95531b2fa69d7fdd4301ae080979d6bec3bfccdd5071570c4c1796e96684012e39912af08fcee443458e6667b778

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks