General

  • Target

    ec089cbe284c5a1297a9a4fbbfe11fca160b09140072b67a4b556931119e2c72

  • Size

    2.0MB

  • Sample

    210915-jftqjsdbfn

  • MD5

    1f87f8356cb8da7291397bdedb616d62

  • SHA1

    c94d9e204cd92b18012ba8a1da2bdd650b7c5809

  • SHA256

    ec089cbe284c5a1297a9a4fbbfe11fca160b09140072b67a4b556931119e2c72

  • SHA512

    9fadef2951dd4ffc02900b9baeaa8c4ee343d0582d338ae119d29268c196dee121b6d4708f0a1844f487c6750416a8030edfda0a8bd85dd80225e7bc2a23f150

Malware Config

Targets

    • Target

      ec089cbe284c5a1297a9a4fbbfe11fca160b09140072b67a4b556931119e2c72

    • Size

      2.0MB

    • MD5

      1f87f8356cb8da7291397bdedb616d62

    • SHA1

      c94d9e204cd92b18012ba8a1da2bdd650b7c5809

    • SHA256

      ec089cbe284c5a1297a9a4fbbfe11fca160b09140072b67a4b556931119e2c72

    • SHA512

      9fadef2951dd4ffc02900b9baeaa8c4ee343d0582d338ae119d29268c196dee121b6d4708f0a1844f487c6750416a8030edfda0a8bd85dd80225e7bc2a23f150

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks