Analysis

  • max time kernel
    18s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    19-06-2021 16:24

General

  • Target

    e66205a325f63c65a6287e62e3f6370d4d9ab102769546e8c1a3e2945aa4e535.dll

  • Size

    158KB

  • MD5

    16c01d939c684b582f7b1d960347b837

  • SHA1

    d67de35864871b4628cd7099842983c36401c4f7

  • SHA256

    e66205a325f63c65a6287e62e3f6370d4d9ab102769546e8c1a3e2945aa4e535

  • SHA512

    0f2f8e3ca8b6da0d4a6147bd2539f3b8957ec96951c79466c5c40650ced2206a809d2d9eea80a970c4615d7df47f58e38eb8d736eb176362f22215c19e121027

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e66205a325f63c65a6287e62e3f6370d4d9ab102769546e8c1a3e2945aa4e535.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:500
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e66205a325f63c65a6287e62e3f6370d4d9ab102769546e8c1a3e2945aa4e535.dll,#1
      2⤵
      • Checks whether UAC is enabled
      PID:3128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3128-114-0x0000000000000000-mapping.dmp

  • memory/3128-115-0x0000000074300000-0x000000007432D000-memory.dmp

    Filesize

    180KB

  • memory/3128-117-0x0000000003140000-0x000000000328A000-memory.dmp

    Filesize

    1.3MB