Blog

(Don't) Bring Dridex Home for the Holidays

Santa wearing dollar sign glasses

With the holiday season upon us and Log4j-nia still keeping most of us awake at night, we want to revisit an old chum who continues to operate in full swing amidst the chaos. With fresh tactics at their disposal, Dridex continues to target large organizations with somewhat elaborate lures to ensure user interaction and infection. On Monday, December 15th we noticed an uptick in the amount of verified malware hiding behind password-protected Microsoft Excel spreadsheets, specifically ones containing the dated “macrosheet” functionality. One of the ongoing experiments we have running atop of InQuest Labs data is a limited brute force of these suspicious files. We will be exploring additional evasion methods leveraged by the Dridex campaign to deliver the payload.

At first glance, the samples containing image lures appear to be using blurred documents to entice users to enable macros. We have observed a variety of different subject lures during this campaign including a CDC COVID-19 form along with a fake resume, a personnel form and fake spreadsheets. As seen in the last two lure images, attackers seem to also be masquerading as the NPD group and their DecisionKey reporting software.

Continuing the trend of delivering initial stage content via maldocs, Dridex has shifted to generating random numerical passwords to protect attached Microsoft Office docs. Dridex operators have gone as far as crafting emails that appear to be legitimate team/department memos and instructions. What follows are examples of these emails sent containing passwords to decrypt the attached documents.

Attachment:Schedule.xls
Subject:calendar 2022
Body:All the group leaders, staff, and concerned membersThis is being informed to you that from 22th December the office will work according to the new working time that has been agreed by all the board of directors in the annual general meeting held today. Following are the details of the new timings.All the staff members and personnel are requested to make note of the timing and come to office as per the new time from the mentioned date.Please e-sign the attached document till the end of the day.excel is secure encrypted PW 61164All the group leaders, staff, and concerned membersThis is being informed to you that from 22th December the office will work according to the new working time that has been agreed by all the board of directors in the annual general meeting held today. Following are the details of the new timings.All the staff members and personnel are requested to make note of the timing and come to office as per the new time from the mentioned date.Please e-sign the attached document till the end of the day.excel is secure encrypted PW 86819
Email Example 1
Attachment:NewRegulations.xls
Subject:new regulations
Body:Due to new federal law from December, 16th (more information is in the attached document):- All unvaccinated employees (with no exceptions) have to make their shot until December, 17th. Those who will not do it in time will be dismissed without warning. Please, find more information in the attached document.- All vaccinated employees from COVID-19 must immediately view attached document for instructions. It informs you on the consequences of lying about vaccination.Please fill out the form in the attached document excel is secure encrypted PW 74826 Due to new federal law from December, 16th (more information is in the attached document):- All unvaccinated employees (with no exceptions) have to make their shot until December, 17th. Those who will not do it in time will be dismissed without warning. Please, find more information in the attached document.- All vaccinated employees from COVID-19 must immediately view attached document for instructions. It informs you on the consequences of lying about vaccination.Please fill out the form in the attached document excel is secure encrypted PW 37129
Email Example 2

An effective evasion method to slow analysis efforts, especially if one is not actively cracking documents or zip archives as password protected content continues to become more mainstay amongst malware families. Once cracked, we notice a macrosheet containing suspicious content; and with a little deobfuscation, we have our first clues.

ALERT (lure)
FOPEN
CALL

As we can see, the macro calls an embedded .vbs file that fetches the next step of the attack chain. Using Discord’s CDN servers for distribution as threat actors have been leveraging heavily in recent campaigns, Dridex fetches a .bin that fetches additional payloads upon execution. The payloads specific to Dridex are easily identifiable by URI pattern/file name, which will not be published due to the racially insensitive nature of their naming convention.

Like any campaign, we can expect that future iterations of Dridex will change tactics and become more elusive. Changes observed between now and the numbered password uptick see slight changes in URI patterns and lure messages. We will continue monitoring these changes as the Dridex campaign continues on.

X-mas Lure

As we get together with loved ones this season, we must remain vigilant of those seeking to rain on our revelry as we move into the new year. From all of us at InQuest: stay safe, happy holidays and happy new year.

InQuest customers are protected against this and other forms of password-protected evasion tactics through a unique email content sourced password cracking algorithm. If you’re curious to read more, schedule a brief or request an email attack simulation.

IOCs

Subjects
calendar 2022
new regulations
File Names
ListPromotion.xls
NewRegulations-open.xls
NewRegulations.xls
Schedule.xls
Termination letter changes.xls
Termination+letter+final.xls
Termination list.xls
TerminationList.xls
Termination of 12-2021.xls

File Hashes

InQuest Labs Original Corpus

InQuest Labs Cracked Corpus

Hashes
0686491aa486f3b480ff5d08e2a78073ad8ad63cbc4942ebd784bf2b90d1afc9
0921806294ab9eb15ef8c033053a73b32e1fb637c382aeadf341e49156448079
0a4088122055f8828b2d6b954d76643b7e5d7f76b4b99900daebd04334ec17c3
1028198982d01df42681e6349f4e6489b050c6514362a677cd6d7162537ee736
104abbd10d5587eaa07b33d239369b214e513ea54da9bfddbedf6e44a1fb3494
10cfe05b10e4b247ac3e918393ce2dad51b2aa13c7ced6bbfa2752002229ce6a
15c437e91417d855b91f41c86d0df02851a2ae5fe16a305f3a343c1aafcbc55a
178c2f792e2b76b3b80e7e79f8c1628f9e54c14becd51cfde7eda9e29a37674b
179d4c96f9d5de2519e804fa009691bfc04d24c717c9dcafa68b813d1ef64757
1934699d56433ac8d58bbfb0a0b3cb979706eac4efbf81e1b4cf1c4795beeae5
1990a83fd7142096670c16e45d205568fe6a98b020b4a78fa655af5e2afc36f4
1b2c57b7f3341c8fcb5c3e1cf12d9dfef0bdf5c9e9f8c6dbc3a161966b377c17
1d82f0434f050ec3103410284ccc427d340b3677333ed67b7e54f9386c2b4daf
1fc6b5f37524fe0259a8174722bb77e5fa9c6b29493ec88984b3a1edd68d358f
2540b66d3575c77d6cf56b7a25c84ee8b3afb890830bc18434eb0eb9a4a025f3
2ab4e259e13de4b04f17b1e851203864869d0dad03e300cb78acf07a75989ab2
2f83a466b51feeeb909c925b011c2a29b5336866a6dfda7ecdf386a207a1ab22
39ae495bd79387da5aab6479021750639422571a8a5ed3cce568993b7f27a1e5
415f0a18582c924995d56dde9bc0cca4550d8c79cda4c1187e01ca3e1adbd33d
4a9be1cf5c7999fd13ad44209f5c2f81d1c7bbab6945fd7a1386d40cd1528d42
55fd2be2dd8141e8a6b07b369f6960ae9535d4dac6e6c09066af09e9f2e3bfd0
6311ce8ae1ed5cd931ba9b996c3a9a30b013042124fa1907b8b1eed9c0a11afc
6b93b95aeba2a91c36927c24a78d31e4e3268c4933e9a8a59c97bbc132ba4aa3
6e36d6f550af23338dbb92581d196a05416e219d35870200637610fe61f90ac8
7027e4f966d496fe1723f3034307262fcf31b87913879b2e022de8bd7a0009bb
729ae5efdc4bc5e64c94a4ff74d8c2fda2343944871cb9634ff57a5660672669
7ac987ae495672f54536de3561ed2edd83bc7ab3c4e2aa7555236d6a5a15e965
7c17f15c6ab4e803c583c81045732c9093a7e3fc85d83fdda7b6e923cc00f98d
7dccaa7dabc4d729cb8492f7b58b960d684777e2ffeeae19b8d44b6191252060
81d3d6adc2ab7d0dfa7748eb3b47e0f948dcf08c748ebd88fc92c5f4003fe02f
85907df576440c2edb02b61c481a57729e237658b34c10a907df4c9e5436fe73
8a7c11ff964ef6e0ab96b0d4899094ea4449f9de7b021dfda4ef365bbf7226eb
928c58601658b9bd9c6b2021f718d1cc84aa38887fb1578c30b39f821b729e38
95c207832e20186155d7eb796c88dfc386b45bab717613b1951052ae8444adf5
9fe48a35ff5d31f60e0291341bcd6a4ebdb7d4bcbcb2f58037cc9ba528ff91d2
a7298803d33dfcbbdc6cd04231f73109c19a939924900a8124632c2c6531339d
a8374e62bc825095adad9a4e568731b9f1ed36558ba281b4a59ac07f5d321a36
afeb058e768bba01a899ec138adde91977149de666b112bad5cc77f8c3e4ee18
b0f2e254c80df8d67a1021b741a93645df10a8038924fa1f20ef70794595eb0e
b7c939d47e33a90b86b969255462c16aee9d8a3d95dd2728bdc11bf55f9095a4
b9064644e469f03905832e6a48e39cec42cc98d25279deaea01bd33a9355ae7a
bdb84f388788f2889497af7e7c1c5ea09ebcf505c8b0e50372492d39a853b8b3
c5995cf378c326aaa5464f4125c5ce772c452ebab0d1f65000cf47868ab46aa2
cacedbdb1abeff00898b498627812045ece2437d0539598b9dee4f15692f6487
ce36e90bae23604deb114b2fffbc2ab6939c2b4b1797c8cd154a7bcd66bfa33d
cee04b4f340a4a6cfc3c2b7bc84a0b486bc25824ac31595e47f806075df2e29d
d42a9b79de88fecde78c64786683b9e02decd120ce17e63516cd858fc5146c37
d68846240eec544727b5a115ea79a03421431553287eb6415c46781106aa717a
da9280ec7b4cadcd65ac497033d0f14accc7f7ebfd9139748df51bc727ac727f
df807b304a0c28d61eec8ca1edd0dd7c8291eb1303fab1201fb328202e48539e
e143c6a2e50f0829f45b2e9ce83130ed859dd49952eb58a7526bebefeef1ebf8
e729271973068c6d8737fb84e480f39b006e19a2aa05b8b29dd7336098c2682b
e759f093144212c013449ad30d20118bfc0b690d9e6696a1a2e354017ee3095b
ef77b0d67b2f4195cb3398d9f6a65c2d46640101f86cd310895e074efdc351e7
f418f6181041880893ccb1838048266dd9702e1b5007907dc272fe9aeaa25e17
f74097096a707d3a5d6c08527566d9f1b60ab0d24aaca12d3631e0f8c81fd74e
f9e83c29d54c4e506a95d71890a8ea26337bedb99f31f90183a67099182de965
faf66c114394d16e2616a622016432ef72b460fa5f96443d7569dedff63bff34
fe949281566ffdd1f539cd26b28df307ca14a058aa02f0d5ed05506d51e73773
Raw hash list

How Effective Is Your Email Security Stack?

Did you know, 80% of malware is delivered via email? How well do your defenses stand up to today’s emerging malware? Discover how effectively your email provider’s security performs with our Email Attack Simulation. You’ll receive daily reports on threats that bypassed your defenses as well as recommendations for closing the gap. Free of charge, for 30 days.

Get My Email Attack Simulation