General

  • Target

    38279f46fbc2ea0c202ef719d9cb49fa010ff4baa82062dfc820638f0fcd30dc

  • Size

    836KB

  • Sample

    210930-nav4mshda4

  • MD5

    66fa3e73dcdd72488330a7e4192d1976

  • SHA1

    531b1c8e28386cd3d279bd76081bc696c53d9e41

  • SHA256

    38279f46fbc2ea0c202ef719d9cb49fa010ff4baa82062dfc820638f0fcd30dc

  • SHA512

    5717a49f8fd0b9d558e413069922346883b0ae1430b1848e4c3ff073120da8a2c0e0012ae21ae9fa6dce5415f165debf8466b8a0931789a1b3227227e6b0e179

Malware Config

Targets

    • Target

      38279f46fbc2ea0c202ef719d9cb49fa010ff4baa82062dfc820638f0fcd30dc

    • Size

      836KB

    • MD5

      66fa3e73dcdd72488330a7e4192d1976

    • SHA1

      531b1c8e28386cd3d279bd76081bc696c53d9e41

    • SHA256

      38279f46fbc2ea0c202ef719d9cb49fa010ff4baa82062dfc820638f0fcd30dc

    • SHA512

      5717a49f8fd0b9d558e413069922346883b0ae1430b1848e4c3ff073120da8a2c0e0012ae21ae9fa6dce5415f165debf8466b8a0931789a1b3227227e6b0e179

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks