Analysis

  • max time kernel
    21s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-04-2021 13:20

General

  • Target

    54a48461c5eebcb2c0ad360835633f993cf4c94956f0b4bd7a2c9c9d365c5e6a.dll

  • Size

    196KB

  • MD5

    38bdbcdeaa8345ad8a5bcfa186912423

  • SHA1

    207f6d77de463a62ca370e91eb08598c2a4ef753

  • SHA256

    54a48461c5eebcb2c0ad360835633f993cf4c94956f0b4bd7a2c9c9d365c5e6a

  • SHA512

    72a178782f857017b80d789d624cd14faff08edd6ecd71f2d439d0539cacc17fde6272dd021e7ad712015d34b18b954f614ee40c1b96c33e96cb0b468712498d

Malware Config

Extracted

Family

dridex

Botnet

111

C2

37.247.35.132:443

50.243.30.51:6601

162.241.204.234:6516

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\54a48461c5eebcb2c0ad360835633f993cf4c94956f0b4bd7a2c9c9d365c5e6a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\54a48461c5eebcb2c0ad360835633f993cf4c94956f0b4bd7a2c9c9d365c5e6a.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Checks whether UAC is enabled
      PID:4780

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4780-2-0x0000000000000000-mapping.dmp
  • memory/4780-3-0x0000000073D90000-0x0000000073DC3000-memory.dmp
    Filesize

    204KB

  • memory/4780-4-0x0000000002F70000-0x0000000002F76000-memory.dmp
    Filesize

    24KB

  • memory/4780-5-0x0000000073D90000-0x0000000073DAF000-memory.dmp
    Filesize

    124KB