General

  • Target

    Gift_Card_209788849.doc

  • Size

    112KB

  • Sample

    201126-cmy9z2vb4n

  • MD5

    d1cf7f50f8414d437acb4f026528909e

  • SHA1

    56811440234742e6b7617685e0dee6a1f4034dfe

  • SHA256

    e20dadb65651d81743aae5451f4f63d6fd7a7da48d4bf71af247a033ac46ee11

  • SHA512

    bb14b8816ab2ab8f44d5299e33576ca32ff717eeb5754452f724d59c61293c08f74cd085a890192ca89944809c402b82470917e1f07309879c2e2da7ba052ade

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://burstner.clabris.se/ucjk7st.zip

exe.dropper

http://bespokeweddings.ie/k1c8dh4.rar

exe.dropper

https://conjurosdeamoryhechiceriaacacio.com/tjbdhdvi1.zip

exe.dropper

https://keitauniv.keita.ae/wchfvdsd7.rar

exe.dropper

https://cms.keita.ae/h0mqrz.rar

exe.dropper

https://airbornegroup.net/y461xrm.zip

exe.dropper

https://phones.pmrspain.com/xzeoxn8.rar

exe.dropper

http://oya.qa/lfonl5.rar

Extracted

Family

dridex

Botnet

10555

C2

194.225.58.216:443

178.254.40.132:691

216.172.165.70:3889

198.57.200.100:3786

rc4.plain
rc4.plain

Targets

    • Target

      Gift_Card_209788849.doc

    • Size

      112KB

    • MD5

      d1cf7f50f8414d437acb4f026528909e

    • SHA1

      56811440234742e6b7617685e0dee6a1f4034dfe

    • SHA256

      e20dadb65651d81743aae5451f4f63d6fd7a7da48d4bf71af247a033ac46ee11

    • SHA512

      bb14b8816ab2ab8f44d5299e33576ca32ff717eeb5754452f724d59c61293c08f74cd085a890192ca89944809c402b82470917e1f07309879c2e2da7ba052ade

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks