Analysis

  • max time kernel
    39s
  • max time network
    47s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-04-2021 18:44

General

  • Target

    f0e9e9b4ab13b3a4345227eda23b9eab39749464f515e6ab1325ee0b730491d6.dll

  • Size

    154KB

  • MD5

    76a2f7515158ef021bddc4b9d965a6a5

  • SHA1

    a1c068b0d1957cfa2ec912b3cea82caa6aba9b97

  • SHA256

    f0e9e9b4ab13b3a4345227eda23b9eab39749464f515e6ab1325ee0b730491d6

  • SHA512

    714da0db44b46b1663f5449e48936667b701a339335736b221007029d457a9f1b8bdcfd6a5655fc3e1f02b7fc0c568a65a1447c4ebbe6e4cbfc427e35b3b6b52

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f0e9e9b4ab13b3a4345227eda23b9eab39749464f515e6ab1325ee0b730491d6.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:596
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f0e9e9b4ab13b3a4345227eda23b9eab39749464f515e6ab1325ee0b730491d6.dll,#1
      2⤵
      • Checks whether UAC is enabled
      PID:1064

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1064-114-0x0000000000000000-mapping.dmp
  • memory/1064-115-0x00000000735F0000-0x000000007361D000-memory.dmp
    Filesize

    180KB

  • memory/1064-117-0x0000000002690000-0x0000000002696000-memory.dmp
    Filesize

    24KB