General

  • Target

    12abffffa93c9a84516116b2fad3d1b0f6e471f703c444f7246721208e1d70f7

  • Size

    836KB

  • Sample

    210930-lpb8zahcbl

  • MD5

    2cf5031e2d993b6fca7345d3023a1e86

  • SHA1

    303612a9f0ea4e08bd2a912e43632d05d457631c

  • SHA256

    12abffffa93c9a84516116b2fad3d1b0f6e471f703c444f7246721208e1d70f7

  • SHA512

    dd752fcf5c88dd883887b3992c845698134d763ac7c792e3cb2237b6bc89f42cbb5025000e517abff70c9023e4ee544edc2ce636192074144121b3f2c77a2fe1

Malware Config

Targets

    • Target

      12abffffa93c9a84516116b2fad3d1b0f6e471f703c444f7246721208e1d70f7

    • Size

      836KB

    • MD5

      2cf5031e2d993b6fca7345d3023a1e86

    • SHA1

      303612a9f0ea4e08bd2a912e43632d05d457631c

    • SHA256

      12abffffa93c9a84516116b2fad3d1b0f6e471f703c444f7246721208e1d70f7

    • SHA512

      dd752fcf5c88dd883887b3992c845698134d763ac7c792e3cb2237b6bc89f42cbb5025000e517abff70c9023e4ee544edc2ce636192074144121b3f2c77a2fe1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks