General

  • Target

    Invoice_2457619.xlsm

  • Size

    329KB

  • Sample

    210727-zvtyjzphzx

  • MD5

    6cb632b4c2e9244c36ad740ef8cbfda5

  • SHA1

    5c90034815dc6faf9d14da1536f05a8a9a1d0f73

  • SHA256

    71fb5ec5a1424b9965bf487a41e24e04e6cd20fb256b283b8262a6592aa90114

  • SHA512

    ec56dc8b6282de9ce3bf865263fbc74741ab98a70ac517f4d1637f025255c06247b11edd95edb9756032e93f7d0cdef93e639088cdd88732c3ccc060e85cc636

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.79.33.48:443

139.162.202.74:5007

68.183.216.174:7443

rc4.plain
rc4.plain

Targets

    • Target

      Invoice_2457619.xlsm

    • Size

      329KB

    • MD5

      6cb632b4c2e9244c36ad740ef8cbfda5

    • SHA1

      5c90034815dc6faf9d14da1536f05a8a9a1d0f73

    • SHA256

      71fb5ec5a1424b9965bf487a41e24e04e6cd20fb256b283b8262a6592aa90114

    • SHA512

      ec56dc8b6282de9ce3bf865263fbc74741ab98a70ac517f4d1637f025255c06247b11edd95edb9756032e93f7d0cdef93e639088cdd88732c3ccc060e85cc636

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks