Analysis

  • max time kernel
    39s
  • max time network
    111s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-04-2021 19:32

General

  • Target

    f12e17df3e92d1323a34d3df27232f06f2172ca93ddce48aa3fdfed1eff80761.dll

  • Size

    192KB

  • MD5

    8e79e397889ae99a48c454f3720f96d5

  • SHA1

    97dc2f507639abfc9a4d424357fa65c04a72c810

  • SHA256

    f12e17df3e92d1323a34d3df27232f06f2172ca93ddce48aa3fdfed1eff80761

  • SHA512

    4a5dc41c97725a9c10b1330fd0e7efe9f51e73b08fec38be9ac683f9b92baea9910c498c3a070e4e9aa357b2cbb496c6dbfcc3dbc54016e1cdfa7ecba25d0b28

Malware Config

Extracted

Family

dridex

Botnet

111

C2

77.220.64.135:443

107.180.90.10:6601

31.24.158.56:7275

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f12e17df3e92d1323a34d3df27232f06f2172ca93ddce48aa3fdfed1eff80761.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f12e17df3e92d1323a34d3df27232f06f2172ca93ddce48aa3fdfed1eff80761.dll,#1
      2⤵
      • Checks whether UAC is enabled
      PID:4792

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4792-2-0x0000000000000000-mapping.dmp
  • memory/4792-3-0x00000000737C0000-0x00000000737F2000-memory.dmp
    Filesize

    200KB

  • memory/4792-4-0x0000000002500000-0x0000000002506000-memory.dmp
    Filesize

    24KB

  • memory/4792-5-0x00000000737C0000-0x00000000737E1000-memory.dmp
    Filesize

    132KB