Fresh Dridex samples
Attachments
infected
(89.95 KiB) Downloaded 119 times
(89.95 KiB) Downloaded 119 times
A forum for reverse engineering, OS internals and malware analysis
sysopfb wrote:md5 4bdc0b2c44041dd16e40eebc447d1fe8This downloader uses the Shim (Gootkit) method in order to bypass UAC.
Packed loader for dridex
start C:\Users\XXXX\AppData\Local\edgE6D5.exe C:\Users\XXXX\Desktop\DRIDEX~1.EX_
sdbinst.exe /q /u "C:\Users\XXXX\AppData\LocalLow\$$$.sdb"
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\iscsicli.exe" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\{f48a0c57-7c48-461c-9957-ab255ddc986e}" /f
del C:\Windows\AppPatch\Custom\{f48a0c57-7c48-461c-9957-ab255ddc986e}.sdb
del %LOCALAPPDATA%Low\$$$.sdb
del %LOCALAPPDATA%Low\$$$.bat
rundll32.exe %FILEPATH% NotifierInit
<config botnet="220">
<server_list>
71.14.1.139:8443
173.230.130.172:2443
94.23.53.23:2443
176.99.6.10:8443
</server_list>
</config>
Export Table
TimeDateStamp: 0x557EF5C6 (GMT: Mon Jun 15 15:56:54 2015)
Name: 0x0004D25C ("worker_x32.dll")
Base: 0x00000001
NumberOfFunctions: 0x00000002
NumberOfNames: 0x00000002
AddressOfFunctions: 0x0004D248
AddressOfNames: 0x0004D250
AddressOfNameOrdinals: 0x0004D258
Ordinal RVA Symbol Name
------- ---------- ----------------------------------
0x0001 0x0001B97A "DllRegisterServer"
0x0002 0x00018996 "DllUnregisterServer"