MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 adbfe3ab87bdb320c3ef08a99550da2b188dfabe822b90519806e5f399732b69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 10


Maldoc score: 35


Intelligence 10 IOCs YARA 8 File information Comments

SHA256 hash: adbfe3ab87bdb320c3ef08a99550da2b188dfabe822b90519806e5f399732b69
SHA3-384 hash: 4973120338166a535d5456164f1c8dba36d063d1c3d065c9687776f7def22d79292c3bd57a34160e031a6c15bc005a13
SHA1 hash: 74661c38f3b1a769862bd2e963b5806e71a50986
MD5 hash: 8e8fb3afaa9fa771d795cba815f7f409
humanhash: whiskey-river-river-cardinal
File name:Subconract 504.xlsm
Download: download sample
Signature Dridex
File size:793'191 bytes
First seen:2021-02-22 16:36:34 UTC
Last seen:2021-02-22 18:56:56 UTC
File type:Excel file xlsm
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 12288:VSZfnIN8qis0K7Tewqxu25sF81WPahDhuKWYkLay/enOxWR44VB0cY6OYCnfEM7O:VSZRCywhvPDDRenOxWluA10L7gt
TLSH AEF4230640A2D1F4FE635F7D63AF5101F1391AC6D103BCE929AEA31812E6AF5271C3E6
Reporter cocaman
Tags:Dridex xlsm

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 35
OLE dump

MalwareBazaar was able to identify 28 sections in this file using oledump:

Section IDSection sizeSection name
A197 bytesCJka5H3iuSV/CompObj
A2267 bytesCJka5H3iuSV/VBFrame
A338 bytesCJka5H3iuSV/f
A40 bytesCJka5H3iuSV/o
A597 bytesOjyQABhDRRWt3m5L/CompObj
A6298 bytesOjyQABhDRRWt3m5L/VBFrame
A794 bytesOjyQABhDRRWt3m5L/f
A84788 bytesOjyQABhDRRWt3m5L/o
A9793 bytesPROJECT
A10266 bytesPROJECTwm
A113476 bytesVBA/CJka5H3iuSV
A123271 bytesVBA/Ei46_Tuzl_wrxh
A132086 bytesVBA/OjyQABhDRRWt3m5L
A14991 bytesVBA/Sheet1
A151895 bytesVBA/ThisWorkbook
A1612127 bytesVBA/W1YSC_Xi2_hTJQ
A178629 bytesVBA/_VBA_PROJECT
A182714 bytesVBA/__SRP_0
A19349 bytesVBA/__SRP_1
A20410 bytesVBA/__SRP_2
A21462 bytesVBA/__SRP_3
A22208 bytesVBA/__SRP_4
A23234 bytesVBA/__SRP_5
A24207 bytesVBA/__SRP_6
A25220 bytesVBA/__SRP_7
A264301 bytesVBA/cMcdwXUX
A271107 bytesVBA/dir
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecWorkbook_OpenRuns when the Excel Workbook is opened
Hex StringTth5D5474683544
Hex String202020202020
Hex Stringwwwwww777777777777 code and P-code are different, this may have been used to hide malicious code
SuspiciousEnvironMay read system environment variables
SuspiciousOpenMay open a file
SuspiciouswriteMay write to a file (if combined with Open)
SuspiciousPutMay write to a file (if combined with Open)
SuspiciousBinaryMay read or write a binary file (if combined with Open)
SuspicioussavetofileMay create a text file
SuspiciousrunMay run an executable file or a system command
SuspiciousCreateMay execute file or a system command through WMI
SuspiciousShowWindowMay hide the application
SuspiciousGetObjectMay get an OLE object with a running instance
SuspiciousWindowsMay enumerate application windows (if combined with Shell.Application object)
SuspiciouslibMay run code from a DLL
SuspiciousChrMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousChrWMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousXorMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)
SuspiciousBase64 StringsBase64-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
2
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
File type:
application/vnd.ms-excel.sheet.macroEnabled.12
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Using the Windows Management Instrumentation requests
Launching a process
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Creating a file in the Windows subdirectories
Result
Verdict:
Malicious
File Type:
Excel File with Macro
Payload URLs
URL
File name
https://psychologynewmind.com/wp-content/plugins/contact-form-7-datepicker/js/jquery-ui-timepicker/pjtxXrSw.php',
vbaProject.bin
Document image
Document image
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Minimal Content
Document contains less than 1 kilobyte of semantic information.
Result
Threat name:
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Creates processes via WMI
Document contains an embedded macro with GUI obfuscation
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Yara detected Dridex unpacked file
Behaviour
Behavior Graph:
Threat name:
Document-Word.Trojan.GenScript
Status:
Malicious
First seen:
2021-02-22 16:37:06 UTC
File Type:
Document
Extracted files:
50
AV detection:
19 of 48 (39.58%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dridex botnet:111 botnet discovery evasion loader trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Modifies system certificate store
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Enumerates physical storage devices
Checks installed software on the system
Checks whether UAC is enabled
Loads dropped DLL
Blocklisted process makes network request
Dridex Loader
Dridex
Process spawned unexpected child process
Malware Config
C2 Extraction:
162.13.114.59:443
70.39.99.196:8172
37.187.115.122:6601
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DridexV4
Author:kevoreilly
Description:Dridex v4 Payload
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:MALWARE_Win_DLLLoader
Author:ditekSHen
Description:Detects unknown DLL Loader
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria
Rule name:win_dridex_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Dridex

Excel file xlsm adbfe3ab87bdb320c3ef08a99550da2b188dfabe822b90519806e5f399732b69

(this sample)

Comments