General

  • Target

    Results12232021.xls

  • Size

    414KB

  • Sample

    211223-te3beaabd2

  • MD5

    8d1d1df2277e8730eee7de7fe28f60e1

  • SHA1

    773b3ff48428bdacf2afeb7fc9fd1261a2e0591c

  • SHA256

    4d21115441459063cf8403f94d3bb37201666be30622cb2cb4e2ffb32827192f

  • SHA512

    5f2f3d4b9295171dbbf246e2e6e23d07fa189bc7e3681ffd9c2778e3fef99621bf8f3b0a4c1d70061d6e06ec27f2c38151ccb4ba83b111bfe8051ca045834b76

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.91.122.102:443

85.10.248.28:593

185.4.135.27:5228

80.211.3.13:8116

rc4.plain
rc4.plain

Targets

    • Target

      Results12232021.xls

    • Size

      414KB

    • MD5

      8d1d1df2277e8730eee7de7fe28f60e1

    • SHA1

      773b3ff48428bdacf2afeb7fc9fd1261a2e0591c

    • SHA256

      4d21115441459063cf8403f94d3bb37201666be30622cb2cb4e2ffb32827192f

    • SHA512

      5f2f3d4b9295171dbbf246e2e6e23d07fa189bc7e3681ffd9c2778e3fef99621bf8f3b0a4c1d70061d6e06ec27f2c38151ccb4ba83b111bfe8051ca045834b76

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks