General

  • Target

    dridex_main_500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc.bin

  • Size

    604KB

  • Sample

    210419-a84qry235s

  • MD5

    82f65be4ff7e40974bea265c524ddfd9

  • SHA1

    b044b52058c3cde173a06811262913c31f0af3e1

  • SHA256

    500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc

  • SHA512

    b0b6e9cb0192f78f42ec6da160a0e070d4b2c6e83f309b6267697f75dd9c484cbaa95ac76ec656d457801482e3372d4cdfdb80260a77dba31aa9ade58de1784c

Malware Config

Targets

    • Target

      dridex_main_500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc.bin

    • Size

      604KB

    • MD5

      82f65be4ff7e40974bea265c524ddfd9

    • SHA1

      b044b52058c3cde173a06811262913c31f0af3e1

    • SHA256

      500545c9760bd316dd59f99cfcc62532ffa929d62e0fdb062ab096f828ab31bc

    • SHA512

      b0b6e9cb0192f78f42ec6da160a0e070d4b2c6e83f309b6267697f75dd9c484cbaa95ac76ec656d457801482e3372d4cdfdb80260a77dba31aa9ade58de1784c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks