The disappearance of Angler has left a gaping hole in the malware market which cybercriminals are only to happy to fill with new variants of old standbys. The latest to reemerge after a period of disuse are Locky and Dridex. A new Locky campaign spotted in the wild on June 20 is analyzed by Pierluigi Paganini on the Security Affairs site. Now a bigger and badder Dridex has reappeared, with more sophisticated evasion tactics, including a new sandbox evasion technique.
Following is an analysis of the latest Dridex version, whose campaign started on June 29, 2016 and which had 0/55 score for the first 2 days it was uploaded:
SHA256: 868fef06ddd2e7967e39b7ae2184f48c8e2a08293b42fa136a8bb955b0d99e1a
The macro is heavily obfuscated:
Proofpoint already documented two evasion techniques:
1. Check for the number of files recently accessed by Microsoft Word:
2. Contact a well-known geo-location service (https://www.maxmind.com/en/locate-my-ip-address) and check the returned result against a blocklist of strings (this time the extended the array of strings by adding “Trustwave” and “Zscaler”):
NOW THE MACRO ADDED ONE MORE EVASION TECHNIQUE:
Testing the Logged-on username against the following strings: "KR3T","PSPUBWS". If username contains one of those strings the attack is aborted.
The latest evasion technique is very interesting; it seems that the attackers tried to identify the popular https://www.hybrid-analysis.com/ vxStream Sandbox service, by going over their logs and looking for the username that is used when scanning documents.
Where “k3rt” is most likely username of some other popular scanning service (malwr.com)
After validation that the user is a normal end-user and not a sandbox, it downloads the payload from the following site [hxxp://pawscoach.com/office.12] using the following PowerShell.
Here are some Dridex samples from the last few days: