Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Visibility and response across your entire Microsoft security ecosystem.
XDR with Machine Learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert threat hunting, original research, and proactive threat intelligence.
TRU is foundational to our MDR service. No add-ons or additional costs required.
Stop ransomware attacks before they disrupt your business.
Detect and respond to zero-day exploits.
Protect against third-party and supply chain risk.
Adopt a risk-based approach to cybersecurity.
Protect your most sensitive data.
Meet cybersecurity regulatory compliance mandates.
Eliminate misconfigurations and policy violations.
Prevent business disruption by outsourcing MDR.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and mediating threats to prevent lateral spread.
Enhance investigation and threat detection across multi-cloud or hybrid environments.
Remediate critical misconfigurations, security vulnerabilities and policy violations across cloud and containerized environments.
Detect malicious insider and identity-based behavior leveraging machine learning models.
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company's mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
We believe a multi-signal approach is paramount to protecting your complete attack surface. See why eSentire MDR means multi-signal telemetry and complete response.
See how our 24/7 SOC Cyber Analysts and Elite Threat Hunters stop even the most advanced cyberattacks before they disrupt your business.
Choose the right mix of Managed Detection and Response, Exposure Management, and Incident Response services to strengthen your cyber resilience.
Try our interactive tools including the MITRE ATT&CK Tool, the SOC Pricing Calculator, the Cybersecurity Maturity Assessment, and our MDR ROI Calculator.
Read the latest security advisories, blogs, reports, industry publications and webinars published by eSentire's Threat Response Unit (TRU).
See why 2000+ organizations count on eSentire to build resilience and prevent business disruption.
Malware researcher Brad Duncan recently reported analysis on a new variant of Dridex he observed on June 17th[1] (edit: Additional information reveals it may have been originally discovered by @James_inthe_box on June 13.) The malware utilizes an Application Whitelisting technique to bypass mitigation via disabling or blocking of Windows Script Host. The technique takes advantage of WMI command-line (WMIC) utility's weak execution policy around xls scripts.
On June 26, 2019, eSentire Threat Intelligence discovered new infrastructure pointing to a similar Dridex variant (see IOCs below). At the time of discovery, using data from VirusTotal, only six antivirus solutions of about 60 detected suspicious behavior [2]. About 12 hours later, on the morning of June 27, 16 antivirus solutions could identify the behavior.
Evolving Malware
Similar to Emotet, Dridex has undergone numerous transformations as it has evolved over the last decade [3]. Dridex first appeared as Cridex in 2011 boasting features such as dynamic configuration, web injections, and infecting connected USB devices. The malware targets banking information on the victim system. Over the last decade, Dridex underwent a series of feature augmentation, including a transition to XML scripts, hashing algorithms, peer-to-peer encryption, and peer-to-command-and-control encryption. Like Emotet, each new version of Dridex traces a further step in the global arms race as the security community responds with new detection and mitigations.
Trend Micro concluded last year that similarities between Emotet, Ursnif, and Dridex indicate some established social structure might exist between the associated threat actors, but the nature of that social structure is not known [4]. Once black markets reach sufficient size and complexity, analogs of partnerships, insider trading, employee transfer of knowledge, and IP theft are likely to take place between malware groups.
Expect More Infrastructure and other Indicator changes
Two observations indicate this campaign isn’t done shifting identifiers. Given the same-day deployment and implementation of the ssl-pert[.]com domain on June 26thand a tendency to utilize randomly generated variables and URL directories, it is probable the actors behind this variant of Dridex will continue to change up indicators throughout the current campaign.
[image src="/assets/DridexMessage2.png" id="2271" width="400" height="309" class="center ss-htmleditorfield-file image" title="DridexMessage2"]
Further, Duncan [1] also reported polymorphism in the supporting library: “the Dridex DLL files are 64-bit DLLs using file names that are loaded by legitimate Microsoft Windows system EXEs. These file paths, file names, and associated SHA256 hashes change every time the victim logs onto the infected Windows host.”
Initial Access
The malware was observed arriving through email in the form of a malicious document with embedded macros. Depending on the environment, the macros can be triggered by varying levels of employee interaction. The message in the email appears as below with specific numbers redacted (as they could potentially be used by a threat actor to track campaign victim metrics).
[image src="/assets/DridexMessage.png" id="2270" width="500" height="187" class="center ss-htmleditorfield-file image" title="DridexMessage"]
Recommendations
Given email as the initial access point, employees are the first line of defense against this threat. Expect financial departments to be targeted by unsolicited invoices carrying malicious macros within. Some antivirus engines were able to detect (but not specify) the suspicious behavior. Given the rapid turnover of infrastructure and indicators, signature-based antivirus solutions will continue to have gaps throughout the Dridex campaign.
Technical Details
If the macros are successfully executed, they hail the ssl-pert[.]com domain to download servern.exe (the Dridex installer). The macro script utilizes an application whitelisting BYPASS technique first described in April of 2018 by Casey Smith (@subTee on Twitter) [5]. In samples observed by both Duncan [1] and eSentire, JavaScript code was embedded in an XSL template capable of execution by wmic with no integrity checks. The XSL script removes itself, then downloads and executes the Dridex installer
Abuse of MWIC was observed by Symantec in August of 2018 [6]. In that case, however, wmic was used to download the XSL file which was then executed by mshta.
Indicators of Compromise (IOCs):
domain: ssl-pert[.]com
executablefilename: servern.exe
executablemd5: 0a5c6944c3622a303803a058f85304b0
maliciousdocumentmd5: 047e1d697768831a05f2c833b7fd3e25
[1] https://isc.sans.edu/forums/diary/Malspam+with+passwordprotected+Word+docs+pushing+Dridex/25042
[3] https://securelist.com/dridex-a-history-of-evolution/78531/
[5] http://subt0x11.blogspot.com/2018/04/wmicexe-whitelisting-bypass-hacking.html
[6] https://www.symantec.com/blogs/threat-intelligence/wmic-download-malware
eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.