General

  • Target

    261bebf5285027976410f57382e01f9e180f72816ed5481db469be4e01c2076f

  • Size

    1.0MB

  • Sample

    210930-lnrl9shcam

  • MD5

    e5694b30bfbf654184398028e646e123

  • SHA1

    6bc33d9edfd70c73454f8418bbc69742f05db201

  • SHA256

    261bebf5285027976410f57382e01f9e180f72816ed5481db469be4e01c2076f

  • SHA512

    5d101e24dd749a77f84746237e2d8f60c52fb44ea6ef1be0928ab07b7df6439dd55a5045f1fa88cd077d5afc32e55e30332a34558dc0c97d259d1202297a35cb

Malware Config

Targets

    • Target

      261bebf5285027976410f57382e01f9e180f72816ed5481db469be4e01c2076f

    • Size

      1.0MB

    • MD5

      e5694b30bfbf654184398028e646e123

    • SHA1

      6bc33d9edfd70c73454f8418bbc69742f05db201

    • SHA256

      261bebf5285027976410f57382e01f9e180f72816ed5481db469be4e01c2076f

    • SHA512

      5d101e24dd749a77f84746237e2d8f60c52fb44ea6ef1be0928ab07b7df6439dd55a5045f1fa88cd077d5afc32e55e30332a34558dc0c97d259d1202297a35cb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks