General

  • Target

    2f2cc296a9e826e62812ceecd5e94afb1c8556269d05ff153983325906e58e79

  • Size

    832KB

  • Sample

    210930-nc6cdshecp

  • MD5

    f86b7b970b6f9f844263842bbf222914

  • SHA1

    e1bfa3154d30cbb1c27391d784e4016597188908

  • SHA256

    2f2cc296a9e826e62812ceecd5e94afb1c8556269d05ff153983325906e58e79

  • SHA512

    d54699d0f4d87f9bb59301da3bbcf03fb5b8f3f6766cb0bb3fd823793ff27c89d776c0d3b743a87326242c98355decbfbfe3e23d4f7b49b92f91bd8e5fc49821

Malware Config

Targets

    • Target

      2f2cc296a9e826e62812ceecd5e94afb1c8556269d05ff153983325906e58e79

    • Size

      832KB

    • MD5

      f86b7b970b6f9f844263842bbf222914

    • SHA1

      e1bfa3154d30cbb1c27391d784e4016597188908

    • SHA256

      2f2cc296a9e826e62812ceecd5e94afb1c8556269d05ff153983325906e58e79

    • SHA512

      d54699d0f4d87f9bb59301da3bbcf03fb5b8f3f6766cb0bb3fd823793ff27c89d776c0d3b743a87326242c98355decbfbfe3e23d4f7b49b92f91bd8e5fc49821

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks