Analysis

  • max time kernel
    38s
  • max time network
    46s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    21-04-2021 18:11

General

  • Target

    c43f42479ceb17cfe0342acd32a1ed0216166a646fa8633bb1aa4efee269c196.dll

  • Size

    154KB

  • MD5

    7c8acbd8a01ddf731d163c3d4b13b24d

  • SHA1

    39c71a51c934e4bcd0bdb3e69b052fc8eff48208

  • SHA256

    c43f42479ceb17cfe0342acd32a1ed0216166a646fa8633bb1aa4efee269c196

  • SHA512

    403567cad0489c80e66085bfff6f69490049e755efa686c9cfa96c093a616fe678a8cb7a9d27e261649ea1b837388996dca43aeb1294db1e974fa1eba6c8edbb

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c43f42479ceb17cfe0342acd32a1ed0216166a646fa8633bb1aa4efee269c196.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c43f42479ceb17cfe0342acd32a1ed0216166a646fa8633bb1aa4efee269c196.dll,#1
      2⤵
      • Checks whether UAC is enabled
      PID:3908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3908-114-0x0000000000000000-mapping.dmp
  • memory/3908-115-0x00000000735D0000-0x00000000735FD000-memory.dmp
    Filesize

    180KB

  • memory/3908-117-0x0000000003400000-0x000000000354A000-memory.dmp
    Filesize

    1.3MB