Analysis

  • max time kernel
    19s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-06-2021 09:54

General

  • Target

    d01b24031b27d14830bc2080165e3a8970e417336bfb71955a0fe9f8bb923eaf.dll

  • Size

    160KB

  • MD5

    4e7ac64cb9a91b4f0ad6174e9f4f768f

  • SHA1

    8e7b6ddfeef97afee322e00c1d73184da7d3a035

  • SHA256

    d01b24031b27d14830bc2080165e3a8970e417336bfb71955a0fe9f8bb923eaf

  • SHA512

    c070144d46365133b6e8ba0ff19b38ad554174e4bb28f7e7b8b882d7e9d03b73b72de8878ec31e6762536418fdae57ea6fd46233a2f9aa230c8c8b42f51a776f

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d01b24031b27d14830bc2080165e3a8970e417336bfb71955a0fe9f8bb923eaf.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d01b24031b27d14830bc2080165e3a8970e417336bfb71955a0fe9f8bb923eaf.dll,#1
      2⤵
      • Checks whether UAC is enabled
      PID:4076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4076-114-0x0000000000000000-mapping.dmp
  • memory/4076-115-0x00000000735E0000-0x000000007360E000-memory.dmp
    Filesize

    184KB

  • memory/4076-117-0x0000000003240000-0x0000000003246000-memory.dmp
    Filesize

    24KB