General

  • Target

    429ad522901cf382e8dadb952a8663f535f5f42086654dd81da3e6ded31927d3

  • Size

    2.0MB

  • Sample

    210915-j1kclsdccj

  • MD5

    2100be187604621fb7833f0c8f4b9afa

  • SHA1

    10eba7fc8a661107b1417c7e3dc35f9fef8654f1

  • SHA256

    429ad522901cf382e8dadb952a8663f535f5f42086654dd81da3e6ded31927d3

  • SHA512

    11c2cadc8203ff6f0da881215422fcd5800c56ef05a0bb4f43dab74f9e8c1b740d178692167dff3aa5eca9f6f1e1a8f02a7c430992861085339fc9a4ad3cc131

Malware Config

Targets

    • Target

      429ad522901cf382e8dadb952a8663f535f5f42086654dd81da3e6ded31927d3

    • Size

      2.0MB

    • MD5

      2100be187604621fb7833f0c8f4b9afa

    • SHA1

      10eba7fc8a661107b1417c7e3dc35f9fef8654f1

    • SHA256

      429ad522901cf382e8dadb952a8663f535f5f42086654dd81da3e6ded31927d3

    • SHA512

      11c2cadc8203ff6f0da881215422fcd5800c56ef05a0bb4f43dab74f9e8c1b740d178692167dff3aa5eca9f6f1e1a8f02a7c430992861085339fc9a4ad3cc131

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks