Analysis

  • max time kernel
    26s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-06-2021 22:33

General

  • Target

    1b9a618e8355183938d9bbe03cde7405ab12fd65d8dbf360a9030601e3a0a793.dll

  • Size

    160KB

  • MD5

    1037262663e8782d7b5d16c2dc743719

  • SHA1

    84ee9debe9d4f07d41eab7c323f45f43cfe57d35

  • SHA256

    1b9a618e8355183938d9bbe03cde7405ab12fd65d8dbf360a9030601e3a0a793

  • SHA512

    395d9b64e1c1dcfb3f63b899c449e9d4d822746c753580af56ac097b83d0663b453a309fa07a10cc17dc82b619d1e861f64c5bd2416fdc2f64c711e523bad69b

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1b9a618e8355183938d9bbe03cde7405ab12fd65d8dbf360a9030601e3a0a793.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1b9a618e8355183938d9bbe03cde7405ab12fd65d8dbf360a9030601e3a0a793.dll,#1
      2⤵
      • Checks whether UAC is enabled
      PID:3192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3192-114-0x0000000000000000-mapping.dmp

  • memory/3192-115-0x0000000073560000-0x000000007358E000-memory.dmp

    Filesize

    184KB

  • memory/3192-117-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB