General

  • Target

    INV_369730_2393121046005.xls

  • Size

    57KB

  • Sample

    210401-3lzjtal71e

  • MD5

    f6ed1fc605203ca75f5d3e4cdf9c8f4d

  • SHA1

    0c424cb3ed68823affe5f7163d18e00d47569c0e

  • SHA256

    bb881851c401f18651d160438cc157a01d27640b081b7b8c909b222986948682

  • SHA512

    e6c315c9a057a2456fa0885c95a79bc0eb2006bc1f4f650675fa86fd59aa386c37e0ce1c0aed38edbf4a5c573b3ee2f30ce018a141cb1bd6f94a2a50ff2bc022

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

dridex

Botnet

10444

C2

131.100.24.215:443

210.65.244.174:6601

195.201.199.53:2303

rc4.plain
rc4.plain

Targets

    • Target

      INV_369730_2393121046005.xls

    • Size

      57KB

    • MD5

      f6ed1fc605203ca75f5d3e4cdf9c8f4d

    • SHA1

      0c424cb3ed68823affe5f7163d18e00d47569c0e

    • SHA256

      bb881851c401f18651d160438cc157a01d27640b081b7b8c909b222986948682

    • SHA512

      e6c315c9a057a2456fa0885c95a79bc0eb2006bc1f4f650675fa86fd59aa386c37e0ce1c0aed38edbf4a5c573b3ee2f30ce018a141cb1bd6f94a2a50ff2bc022

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks