General

  • Target

    decrypted_bot_e2043c53a5f8383d9b640c101eb3ad1f.bin

  • Size

    656KB

  • Sample

    210122-mn83lemwze

  • MD5

    e2043c53a5f8383d9b640c101eb3ad1f

  • SHA1

    ad8eb04e9c6eed46a66edf2f41b42e2699d2fd01

  • SHA256

    b3182eb3fd2cb783925e57f6b8db3c5f720c872961c4c08af23fbe9fe13be8cb

  • SHA512

    e47a0a4f6f65e219a56455452de2be4b46d7e7486153e45eb672d8d1a563fcabba1dab1d243656f28ae98ca2a0b2a7408609e8e18d58faafc448680aa8f4af9c

Malware Config

Targets

    • Target

      decrypted_bot_e2043c53a5f8383d9b640c101eb3ad1f.bin

    • Size

      656KB

    • MD5

      e2043c53a5f8383d9b640c101eb3ad1f

    • SHA1

      ad8eb04e9c6eed46a66edf2f41b42e2699d2fd01

    • SHA256

      b3182eb3fd2cb783925e57f6b8db3c5f720c872961c4c08af23fbe9fe13be8cb

    • SHA512

      e47a0a4f6f65e219a56455452de2be4b46d7e7486153e45eb672d8d1a563fcabba1dab1d243656f28ae98ca2a0b2a7408609e8e18d58faafc448680aa8f4af9c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks