General

  • Target

    dbd32ab6f770eab62186304c10f0193d394915ba69e42e6d73a6e289f2ba7b9c

  • Size

    1.8MB

  • Sample

    210915-jft2badbfp

  • MD5

    2317b4b8cda1f39f528983d2fa713a1d

  • SHA1

    5baff10ee8921062fb18f87a95b1901d574f4e84

  • SHA256

    dbd32ab6f770eab62186304c10f0193d394915ba69e42e6d73a6e289f2ba7b9c

  • SHA512

    20c974f08ae80ffaaab60b85a6a25174be80494e8ee5baf2207128faf66277e7fe317fbd8c401fd8540e13df6784405d20b566e0916a9277f0031da3b08b31bb

Malware Config

Targets

    • Target

      dbd32ab6f770eab62186304c10f0193d394915ba69e42e6d73a6e289f2ba7b9c

    • Size

      1.8MB

    • MD5

      2317b4b8cda1f39f528983d2fa713a1d

    • SHA1

      5baff10ee8921062fb18f87a95b1901d574f4e84

    • SHA256

      dbd32ab6f770eab62186304c10f0193d394915ba69e42e6d73a6e289f2ba7b9c

    • SHA512

      20c974f08ae80ffaaab60b85a6a25174be80494e8ee5baf2207128faf66277e7fe317fbd8c401fd8540e13df6784405d20b566e0916a9277f0031da3b08b31bb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks