General

  • Target

    5.xls

  • Size

    520KB

  • Sample

    211223-skcr9sahcn

  • MD5

    e2b0679b16aa0dec7ce88eff648da07b

  • SHA1

    14171aabd0e2eb5459d2658f2722cdbb7984467c

  • SHA256

    549e9c482a86ce538479ce52bab994b0bc2650bd0d21aa362d5708b035615dbd

  • SHA512

    74b3fe6de207c55c69b9a9b52a81c88dd14ac64dfb5b8d54650c621e587a5364089d726cb416987563c377b6a084c3c8b19adfc0f5bc9709b868df1836ce1b2a

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.91.122.102:443

85.10.248.28:593

185.4.135.27:5228

80.211.3.13:8116

rc4.plain
rc4.plain

Targets

    • Target

      5.xls

    • Size

      520KB

    • MD5

      e2b0679b16aa0dec7ce88eff648da07b

    • SHA1

      14171aabd0e2eb5459d2658f2722cdbb7984467c

    • SHA256

      549e9c482a86ce538479ce52bab994b0bc2650bd0d21aa362d5708b035615dbd

    • SHA512

      74b3fe6de207c55c69b9a9b52a81c88dd14ac64dfb5b8d54650c621e587a5364089d726cb416987563c377b6a084c3c8b19adfc0f5bc9709b868df1836ce1b2a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks