2019-03-29 - QUICK POST: MALSPAM USING PASSWORD-PROTECTED WORD DOCS PUSHES DRIDEX

NOTICE:

ASSOCIATED FILES:

NOTES:

 

MALSPAM


Shown above:  Example of the malspam (still typical for this campaign).

 

UNLOCKED ATTACHMENT


Shown above:  Attached Word doc after using the password to unlock it.

 


Shown above:  Macro extracted from the attached Word document.

 


Shown above:  URL and downloaded file name are backwards in the VB script from the macro.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 


Shown above:  Certificate data from post-infection traffic caused by Dridex (1 of 2).

 


Shown above:  Certificate data from post-infection traffic caused by Dridex (2 of 2).

 


Shown above:  Other post-infection traffic from the Dridex-infected Windows host.

 

MALWARE


Shown above:  Initial executable retrieved by the Word macro.

 


Shown above:  One of the Dridex DLL files persistent on the infected Windows host.

 


Shown above:  Another of the Dridex DLL files persistent on the infected Windows host.

 

Click here to return to the main page.