General

  • Target

    19233a69e7feef7ee4606ea4a05424d135609e558d2e9cacb4ba846115cca881

  • Size

    836KB

  • Sample

    210930-metkyahcb5

  • MD5

    9a0a0328803cf7e14e1b5f771c01c541

  • SHA1

    96fe5a5b7391ef7eac505a8e061a56387c4c0790

  • SHA256

    19233a69e7feef7ee4606ea4a05424d135609e558d2e9cacb4ba846115cca881

  • SHA512

    d9052a348c3af195c72115918b3163bdfcc5d0183752197fd73b47a84b09172c20d36fa614250f9e4aedcf3fd7b8fd5b1daffc234bda5ad4d1e9b42f9054700e

Malware Config

Targets

    • Target

      19233a69e7feef7ee4606ea4a05424d135609e558d2e9cacb4ba846115cca881

    • Size

      836KB

    • MD5

      9a0a0328803cf7e14e1b5f771c01c541

    • SHA1

      96fe5a5b7391ef7eac505a8e061a56387c4c0790

    • SHA256

      19233a69e7feef7ee4606ea4a05424d135609e558d2e9cacb4ba846115cca881

    • SHA512

      d9052a348c3af195c72115918b3163bdfcc5d0183752197fd73b47a84b09172c20d36fa614250f9e4aedcf3fd7b8fd5b1daffc234bda5ad4d1e9b42f9054700e

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks