Analysis

  • max time kernel
    141s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    26-07-2021 14:13

General

  • Target

    99587d7eab4164a1ac79915ee3fe4463.exe

  • Size

    1.1MB

  • MD5

    99587d7eab4164a1ac79915ee3fe4463

  • SHA1

    16fd81287801860fc0ec042fdc76a71dfbf5dd4a

  • SHA256

    c52da0b6dc88890a5897ab60295a1ab3c82417b461f9ddce2573cf9cd8336229

  • SHA512

    c30dbfb5029b1bb3bde69e139dee63e9f258632308dc2bbbc0b735a1a630f40200148e2c600f830f643df11ee2914f53a91a48b91ad16663b617907e76423f05

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

177.185.32.10:8194

178.33.158.180:10172

109.74.50.71:9043

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99587d7eab4164a1ac79915ee3fe4463.exe
    "C:\Users\Admin\AppData\Local\Temp\99587d7eab4164a1ac79915ee3fe4463.exe"
    1⤵
    • Checks whether UAC is enabled
    PID:468

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/468-59-0x0000000075051000-0x0000000075053000-memory.dmp
    Filesize

    8KB

  • memory/468-60-0x0000000000220000-0x000000000025C000-memory.dmp
    Filesize

    240KB

  • memory/468-61-0x0000000000400000-0x0000000000524000-memory.dmp
    Filesize

    1.1MB