General

  • Target

    347d827101bbb1fc114fe06e705670046350338683e3cea6643ab55b9e0f6558

  • Size

    796KB

  • Sample

    210930-n5sl1aheb4

  • MD5

    08ab2257c2178ced9a295c898358c802

  • SHA1

    b1dcda430e56360b712ee0934331922929d4d69d

  • SHA256

    347d827101bbb1fc114fe06e705670046350338683e3cea6643ab55b9e0f6558

  • SHA512

    78142541a4dc5c22ccc8fc28198d4bd8f040e1eebd1c4208ef9301f074885eec7b6ba0b89798579d188214f07bf130aa97a8c99d47b90cd7dd001564f1b9975f

Malware Config

Targets

    • Target

      347d827101bbb1fc114fe06e705670046350338683e3cea6643ab55b9e0f6558

    • Size

      796KB

    • MD5

      08ab2257c2178ced9a295c898358c802

    • SHA1

      b1dcda430e56360b712ee0934331922929d4d69d

    • SHA256

      347d827101bbb1fc114fe06e705670046350338683e3cea6643ab55b9e0f6558

    • SHA512

      78142541a4dc5c22ccc8fc28198d4bd8f040e1eebd1c4208ef9301f074885eec7b6ba0b89798579d188214f07bf130aa97a8c99d47b90cd7dd001564f1b9975f

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks