Vitali Kremez
  • Home
  • About
  • Contact
  • Cyber Security
  • Cyber Intel
  • Programming
  • Reverse Engineering
  • Exploit Development
  • Penetration Test
  • WIN32 Assembly
  • On Writing
    • Blog
    • LSAT
    • Photo
  • Honeypot
  • Forum

Unpacking Dridex: Malware Analysis

7/3/2016

0 Comments

 
Tools: CFF Explorer, Ollydbg, FakeNet, IDAPro, ExeScan, SysAnalyzer, pestudio
Environment: Microsoft XP SP1 (Victim), Remnux VM (Analyst)

Takeaways:
  • (1) Interesting Registry Anti-Analysis Routines Detected by API Logger
  • (2) Used Armadillo Packer v1.71 at OEP 00422856 ​
  • (3) Compiled in Microsoft Visual Studio C++ v6.0
  • (4) Communicates to the following P2P nodes:
    • 188.93.239.28:4843
    • 38.64.199.33:4843
    • 85.17.155.148:1234
  • (5) Botnet ID is 120.
Picture

File: dridex.exe
Size: 221184
Unpacked at OEP 00422856 (Armadillo Packer)


Processes:
PID    ParentPID    User    Path    
--------------------------------------------------
4776    5124    USER-06EF21E8DC:Administrator    C:\Documents and Settings\Administrator\Desktop\dridex.exe    

    [*] MD5     : 86c6b28be7b973a69dd049ec0283e935
    [*] SHA-1     : c075fe462b1254d74798337b71ef1b82a81c4bef
    [*] SHA-256    : a9dd22723f0ad6316c2c87727f5b01319cf703d03799efad44f9d8930c4ce5eb
    [*] Imphash     : a8c14b423f16267d80724d4045aa5bb7


[+] File Type: EXE

[+] Signature [Compiler/Packer]

    ['Armadillo v1.71']

[+] Address of entry point    : 0x00022b56

[+] Image Base Address        : 0x00400000

[+] Sections
    Name: .text    Virtual Address: 0x00001000    Size: 0x00021cec    Entropy: 7.198276
    Name: .rdata    Virtual Address: 0x00023000    Size: 0x0000a896    Entropy: 6.127880
    Name: .data    Virtual Address: 0x0002e000    Size: 0x0001efe4    Entropy: 4.501903
    Name: .rsrc    Virtual Address: 0x0004d000    Size: 0x00003120    Entropy: 4.565060

[+] Anomalies Check

    [*] Header Checksum is zero!

    [-] Import Table

        IA: 0x004230c0    CreateRemoteThread
        IA: 0x004231bc    HttpSendRequestExA
        IA: 0x00423184    HttpQueryInfoA
        IA: 0x004231a4    HttpSendRequestW
        IA: 0x00423110    InternetCloseHandle
        IA: 0x004231ac    InternetGetConnectedState
        IA: 0x004231a0    InternetReadFileExA

Picture
Picture

Kernel31 Api Log (Interesting Anti-Analysis):
--------------------------------------------------
***** Installing Hooks *****         
771b9296     CreateMutex((null))    
771b180c     WaitForSingleObject(71c,ffffffff)    
71ad108d     GetCurrentProcessId()=4776    
771bac3b     LoadLibraryA(wsock32)=71ad0000    
771bacdf     LoadLibraryA(ws2_32)=71ab0000    
405a7c     RegOpenKeyExA (HKLM\SOFTWARE\TrendMicro\Vizor)    
405a45     RegOpenKeyExA (HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName)    
405a45     RegOpenKeyExA (HKCU\Volatile Environment)    
77de98fb     RegOpenKeyExA (SOFTWARE\Microsoft\Cryptography\Providers\Type 001)    
77de998b     RegOpenKeyExA (HKLM\SOFTWARE\Microsoft\Cryptography\Defaults\Provider Types\Type 001)    
77de7a5b     RegOpenKeyExA (HKLM\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Microsoft Strong Cryptographic Provider)    
77de8d4c     ReadFile()    
7c821a7c     CreateFileA(C:\WINDOWS\system32\rsaenh.dll)    
68026005     ReadFile()    
680265ce     RegOpenKeyExA (HKLM\Software\Policies\Microsoft\Cryptography)    
77de8810     LoadLibraryA(rsaenh.dll)=68000000    
680223ff     RegOpenKeyExA (HKLM\Software\Microsoft\Cryptography)    
680257b0     RegOpenKeyExA (HKLM\Software\Microsoft\Cryptography\Offload)    
405a45     RegOpenKeyExA (HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall)    
40923e     RegEnumKeyA(Fiddler2)    
405a45     RegOpenKeyExA (7-Zip)    
405a45     RegOpenKeyExA (AddressBook)    
405a45     RegOpenKeyExA (Connection Manager)    
405a45     RegOpenKeyExA (DirectAnimation)    
405a45     RegOpenKeyExA (DirectDrawEx)    
405a45     RegOpenKeyExA (DXM_Runtime)    
405a45     RegOpenKeyExA (Explorer Suite_is1)    
405a45     RegOpenKeyExA (Fiddler2)    
405a45     RegOpenKeyExA (Fontcore)    
405a45     RegOpenKeyExA (ICW)    
405a45     RegOpenKeyExA (IDA Pro Free_is1)    
405a45     RegOpenKeyExA (IE40)    
405a45     RegOpenKeyExA (IE4Data)    
405a45     RegOpenKeyExA (IE5BAKEX)    
405a45     RegOpenKeyExA (IEData)    
405a45     RegOpenKeyExA (Malcode Analyst Pack_is1)    
405a45     RegOpenKeyExA (Microsoft .NET Framework 4 Client Profile)    

405a45     RegOpenKeyExA (Microsoft .NET Framework 4 Extended)    
405a45     RegOpenKeyExA (Microsoft Help Viewer 1.0)    
405a45     RegOpenKeyExA (MobileOptionPack)    
405a45     RegOpenKeyExA (Mozilla Firefox 43.0.1 (x86 en-US))    
405a45     RegOpenKeyExA (MozillaMaintenanceService)    
405a45     RegOpenKeyExA (MPlayer2)    
405a45     RegOpenKeyExA (NetMeeting)    
405a45     RegOpenKeyExA (OutlookExpress)    
405a45     RegOpenKeyExA (PCHealth)    
405a45     RegOpenKeyExA (SchedulingAgent)    
405a45     RegOpenKeyExA (SDKSetup_7.1.7600.0.30514)    
405a45     RegOpenKeyExA (SysAnalyzer_is1)    
405a45     RegOpenKeyExA (WIC)    
405a45     RegOpenKeyExA (WinPcapInst)    
405a45     RegOpenKeyExA (Wireshark)    
771c2949     RegOpenKeyExA (HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Http Filters\RPA)    
771c2969     RegOpenKeyExA (HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Http Filters\RPA)    
77a8a881     RegOpenKeyExA (HKLM\Software\Microsoft\Cryptography\OID)    
77a8a74e     RegEnumKeyA(EncodingType 0)    
77a8a769     RegOpenKeyExA (EncodingType 0)    
77a8a769     RegOpenKeyExA (CertDllOpenStoreProv)    
77a8a74e     RegEnumKeyA(#16)    
77a8a769     RegOpenKeyExA (#16)    
77a8a74e     RegEnumKeyA(Ldap)    
77a8a769     RegOpenKeyExA (Ldap)    
77a8a74e     RegEnumKeyA(EncodingType 1)    
77a8a769     RegOpenKeyExA (EncodingType 1)    
77aa3643     LoadLibraryA(VERSION.dll)=77c00000    
769c4e0b     GlobalAlloc()    
77aa3acd     LoadLibraryA(userenv.dll)=769c0000    
769c7c18     ReadFile()    
77abf798     ReadFile()    
76c31b3f     CreateMutex((null))    
771fdb05     LoadLibraryA(wintrust.dll)=76c30000    
77238600     LoadLibraryA(VERSION.dll)=77c00000    
771fde83     LoadLibraryA(schannel)=767f0000    
771b16f6     GetSystemTime()    
771bcb80     WaitForSingleObject(710,ffffffff)    
771bc7b4     WaitForSingleObject(714,ffffffff)    
771cd245     GetVersionExA()    
771cd1ca     GetVersionExA()    
76ee36b4     GlobalAlloc()    
76ee3aa4     GlobalAlloc()    
76ee3a16     CreateMutex(RasPbFile)    
771cd128     LoadLibraryA(RASAPI32.DLL)=76ee0000    
77f70640     RegOpenKeyExA (Domains\188.93.239.28)    
77f68c60     RegOpenKeyExA (HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\188.93.239.28)    

7e1ebd98     LoadLibraryA(WININET.dll)=771b0000    
77f70640     RegOpenKeyExA (ProtocolDefaults\)    
7e1ea432     WaitForSingleObject(798,ffffffff)    
771bd320     socket(family=2,type=1,proto=6)    
21a962     GetCurrentProcessId()=4776    
212354     GetCommandLineA()    
1f977e     RegOpenKeyExA (HKLM\software\komodia)    
1f9660     GetVersionExA()    
71ab78f1     LoadLibraryA(C:\WINDOWS\system32\ASProxy.dll)=1e0000    
7c8106e5     CreateRemoteThread(h=ffffffff, start=1ec3c0)    
1ecc5d     GetSystemTime()    
7c8106e5     CreateRemoteThread(h=ffffffff, start=2067c0)    
77de6dd6     WaitForSingleObject(62c,2bf20)    
77e9f2ff     RegOpenKeyExA (HKLM\Software\Microsoft\Rpc\SecurityService)    
71a56c59     LoadLibraryA(C:\WINDOWS\system32\MSWSOCK.dll)=71a50000    
20411f     WaitForSingleObject(61c,64)    
71aa17d6     GlobalAlloc()    
71ab78f1     LoadLibraryA(C:\WINDOWS\system32\mswsock.dll)=71a50000    
1f7a50     GetVersionExA()    
71aa39d4     GlobalAlloc()    
7c8106e5     CreateRemoteThread(h=ffffffff, start=71aa2af1)    
771bd363     bind(604, port=0)    
771bd3a9     connect( 188.93.239.28:4843 )    
71aa2b53     LoadLibraryA(C:\WINDOWS\system32\WS2HELP.dll)=71aa0000    
20411f     WaitForSingleObject(5f4,4e20)    
5ad8bdf9     GetCurrentProcessId()=4776    
5ad7a0e2     IsDebuggerPresent()    
20411f     WaitForSingleObject(5f0,32)    
771bfb5a     closesocket(604)         

Raw Strings:
--------------------------------------------------
File: dridex_dmp.exe_
MD5:  aeedb82a2dfd267c7fb5cf25e2891e89
Size: 331778

 VS_FIXEDFILEINFO:
  FileVersion         :  0.230.46.255
  ProductVersion      :  0.168.135.68
  StrucVersion        :  0x10000
  FileFlagsMask       :  0x3f
  FileFlags           :  0
  FileOS              :  0x40004
  FileType            :  1
  FileSubtype         :  0

# StringTable 000004b0:
  CompanyName         :  "jiiSoft"
  FileDescription     :  "Attraction"
  FileVersion         :  "232, 60, 234, 170"
  InternalName        :  "Caster"
  LegalCopyright      :  "Copyright © 2010"
  OriginalFilename    :  "Accolades.exe"
  ProductVersion      :  "67, 173, 162, 182"

=== Compiler ===

  MS Visual C++ v6.0
0 Comments



Leave a Reply.

    Author

    Vitali Kremez

    Archives

    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    January 2016
    December 2015

    Categories

    All

    RSS Feed

Powered by Create your own unique website with customizable templates.
  • Home
  • About
  • Contact
  • Cyber Security
  • Cyber Intel
  • Programming
  • Reverse Engineering
  • Exploit Development
  • Penetration Test
  • WIN32 Assembly
  • On Writing
    • Blog
    • LSAT
    • Photo
  • Honeypot
  • Forum