General

  • Target

    BItnXySrFeNTtqudIaaoW.rtf.hta

  • Size

    5KB

  • Sample

    211224-bf2gdscgel

  • MD5

    173662596f9b5261d1030c562fbfa1cb

  • SHA1

    12346b4dc8a92a25977966a65f82e5fbc181e44a

  • SHA256

    3843d789fde5df893756d4d17ea8d4d06a184915d3999477bb4dc06ee871c100

  • SHA512

    054909a433d2fa855f5dccb705c9d26ed9cb599ecab2dfdb24543fb473385c971d2f8727c394d54eeb638b8bc0bce67eb91e0aab04a4993dfbb4eff295cecf75

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.91.122.102:443

85.10.248.28:593

185.4.135.27:5228

80.211.3.13:8116

rc4.plain
rc4.plain

Targets

    • Target

      BItnXySrFeNTtqudIaaoW.rtf.hta

    • Size

      5KB

    • MD5

      173662596f9b5261d1030c562fbfa1cb

    • SHA1

      12346b4dc8a92a25977966a65f82e5fbc181e44a

    • SHA256

      3843d789fde5df893756d4d17ea8d4d06a184915d3999477bb4dc06ee871c100

    • SHA512

      054909a433d2fa855f5dccb705c9d26ed9cb599ecab2dfdb24543fb473385c971d2f8727c394d54eeb638b8bc0bce67eb91e0aab04a4993dfbb4eff295cecf75

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks