Analysis

  • max time kernel
    91s
  • max time network
    91s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    04-05-2021 15:20

General

  • Target

    c916448e0e655e1c5bccf452efb7604772ee816c9b5f9c11b0a89c17e2942e35.dll

  • Size

    161KB

  • MD5

    27bfb49d003b0285b1077e8dc57c8323

  • SHA1

    45caa2793e1bcf1d1fa63e6f74e03d6d6ce22829

  • SHA256

    c916448e0e655e1c5bccf452efb7604772ee816c9b5f9c11b0a89c17e2942e35

  • SHA512

    37e6b51c28fc3ea76a50e4f4fa18525b43faf26348d6b9ba2336a64df11745e664693a88ee0c4a56b02390305239d43a9973ae0ec2fa24802cf412778fc568ac

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c916448e0e655e1c5bccf452efb7604772ee816c9b5f9c11b0a89c17e2942e35.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c916448e0e655e1c5bccf452efb7604772ee816c9b5f9c11b0a89c17e2942e35.dll,#1
      2⤵
      • Checks whether UAC is enabled
      PID:3212

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3212-114-0x0000000000000000-mapping.dmp
  • memory/3212-115-0x0000000073860000-0x000000007388E000-memory.dmp
    Filesize

    184KB

  • memory/3212-117-0x0000000002AB0000-0x0000000002AB6000-memory.dmp
    Filesize

    24KB