General

  • Target

    c3d50a88f8072069133b3d4a6bccc8edf83989520b7d7d325fefb32abe4ba682

  • Size

    2.0MB

  • Sample

    210915-jge9jsabb6

  • MD5

    166c18e2ba9d58f60b28a70414acfb52

  • SHA1

    2d8572d76486027c544ec349d4245576e6de6d80

  • SHA256

    c3d50a88f8072069133b3d4a6bccc8edf83989520b7d7d325fefb32abe4ba682

  • SHA512

    f51805594e111d5a01ed81f725d2b43317d028df4c7c761bd14d03719bd7f845ac45e50a2046bf7eeabf3599af58dfad42351a742df34436b1623585a2b5ac29

Malware Config

Targets

    • Target

      c3d50a88f8072069133b3d4a6bccc8edf83989520b7d7d325fefb32abe4ba682

    • Size

      2.0MB

    • MD5

      166c18e2ba9d58f60b28a70414acfb52

    • SHA1

      2d8572d76486027c544ec349d4245576e6de6d80

    • SHA256

      c3d50a88f8072069133b3d4a6bccc8edf83989520b7d7d325fefb32abe4ba682

    • SHA512

      f51805594e111d5a01ed81f725d2b43317d028df4c7c761bd14d03719bd7f845ac45e50a2046bf7eeabf3599af58dfad42351a742df34436b1623585a2b5ac29

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks