General

  • Target

    d88b0762c91122715c0cf186a0aa52c07fea100546b77eb489cbf273cc649aac

  • Size

    1.6MB

  • Sample

    210915-jgeysaabb3

  • MD5

    145627385585a47d56ab66e05914334e

  • SHA1

    5a57a5fc9ca77dc4a174f29d29b89642ae6d4f57

  • SHA256

    d88b0762c91122715c0cf186a0aa52c07fea100546b77eb489cbf273cc649aac

  • SHA512

    70a4a7533487ac88bfb4ea313e6f437a2b704326cc2740736a5e9bce4b754a1daa07b32f1b10cdc7ed8e638bb3262cf9f91a9faa6dbd6ef81e1b553a4727e3c6

Malware Config

Targets

    • Target

      d88b0762c91122715c0cf186a0aa52c07fea100546b77eb489cbf273cc649aac

    • Size

      1.6MB

    • MD5

      145627385585a47d56ab66e05914334e

    • SHA1

      5a57a5fc9ca77dc4a174f29d29b89642ae6d4f57

    • SHA256

      d88b0762c91122715c0cf186a0aa52c07fea100546b77eb489cbf273cc649aac

    • SHA512

      70a4a7533487ac88bfb4ea313e6f437a2b704326cc2740736a5e9bce4b754a1daa07b32f1b10cdc7ed8e638bb3262cf9f91a9faa6dbd6ef81e1b553a4727e3c6

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks