General

  • Target

    f025f6648a7f6974197106d60dd007b7fd8d07b64ba344a45a3a13d4f27a36fe

  • Size

    1.9MB

  • Sample

    210915-jftqjsdbfm

  • MD5

    1e9b0b70cdf360d0b18e097519ff669c

  • SHA1

    d7f826da60ef7e74c9989f5e7dc94bd51bf5a4cb

  • SHA256

    f025f6648a7f6974197106d60dd007b7fd8d07b64ba344a45a3a13d4f27a36fe

  • SHA512

    98553a13caec28389568e21b9f5d24e5f6afcfafec20fec564ed0d54c42d7db6c534f0a7e781c95b0040c1b149dd3e833fceb978131c4e7b0efee6436798628b

Malware Config

Targets

    • Target

      f025f6648a7f6974197106d60dd007b7fd8d07b64ba344a45a3a13d4f27a36fe

    • Size

      1.9MB

    • MD5

      1e9b0b70cdf360d0b18e097519ff669c

    • SHA1

      d7f826da60ef7e74c9989f5e7dc94bd51bf5a4cb

    • SHA256

      f025f6648a7f6974197106d60dd007b7fd8d07b64ba344a45a3a13d4f27a36fe

    • SHA512

      98553a13caec28389568e21b9f5d24e5f6afcfafec20fec564ed0d54c42d7db6c534f0a7e781c95b0040c1b149dd3e833fceb978131c4e7b0efee6436798628b

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks