Analysis

  • max time kernel
    18s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-08-2021 06:30

General

  • Target

    260f418b2b8b071a44b6de2ca53f2e1b2b2ee0d8c8371bf0ab23e445ecf92dfc.dll

  • Size

    184KB

  • MD5

    6186f4d41087246aa55a28071dfc47ab

  • SHA1

    6f66d93c5740a32a2c3e37ce555b2e183f07539f

  • SHA256

    260f418b2b8b071a44b6de2ca53f2e1b2b2ee0d8c8371bf0ab23e445ecf92dfc

  • SHA512

    78a2bf95f4a9034b8ce9fc51165fa2bd62c610b97d5fce37f5ef85820bd9f5a5f0f3e8cae29ee95635401a1b99d4db859d732778cf30b204b73a8a155a579b9f

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.75.201.2:443

158.223.1.108:6225

165.22.28.242:4664

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\260f418b2b8b071a44b6de2ca53f2e1b2b2ee0d8c8371bf0ab23e445ecf92dfc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\260f418b2b8b071a44b6de2ca53f2e1b2b2ee0d8c8371bf0ab23e445ecf92dfc.dll,#1
      2⤵
        PID:500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 500 -s 616
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3476

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/500-114-0x0000000000000000-mapping.dmp
    • memory/500-115-0x0000000073DE0000-0x0000000073E10000-memory.dmp
      Filesize

      192KB

    • memory/500-117-0x00000000006E0000-0x00000000006E6000-memory.dmp
      Filesize

      24KB