General

  • Target

    b07aff83880c9d5315322e289018077face4c3992f81cf08d56ac2602e212385

  • Size

    1.8MB

  • Sample

    210915-jw5gzsabd8

  • MD5

    0378e8aa3da2d2434de4c4cf4438a0fe

  • SHA1

    97ae668529c07298a492503ff2eb601467796ee6

  • SHA256

    b07aff83880c9d5315322e289018077face4c3992f81cf08d56ac2602e212385

  • SHA512

    891c81fc4b756779365ee51a6f0a29e4bcfaccbcc551d321117e0b7ad787bf878d6c77c8a2880e22ad3de9923f5b1e229dae799dccf52f350dfc07388e8a6403

Malware Config

Targets

    • Target

      b07aff83880c9d5315322e289018077face4c3992f81cf08d56ac2602e212385

    • Size

      1.8MB

    • MD5

      0378e8aa3da2d2434de4c4cf4438a0fe

    • SHA1

      97ae668529c07298a492503ff2eb601467796ee6

    • SHA256

      b07aff83880c9d5315322e289018077face4c3992f81cf08d56ac2602e212385

    • SHA512

      891c81fc4b756779365ee51a6f0a29e4bcfaccbcc551d321117e0b7ad787bf878d6c77c8a2880e22ad3de9923f5b1e229dae799dccf52f350dfc07388e8a6403

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks