General

  • Target

    4e42ecf4212ecc0075c89a03dd7d5dd0f2fd14b97b6dba6dfe32ee2905e352bb

  • Size

    820KB

  • Sample

    210930-nh98jahefk

  • MD5

    5437fb9ceca6cef775bd8ffc336645ec

  • SHA1

    4f0b0209ef0dd46f8cc9d575209a87db4b751434

  • SHA256

    4e42ecf4212ecc0075c89a03dd7d5dd0f2fd14b97b6dba6dfe32ee2905e352bb

  • SHA512

    97a26229274b4e61a44641b6e6c4e5377367e32e4f8fe2ac9c15b3726aa5fc75dada2864d2da46e7ed7eb5dcadbb82f95bac0a1eb12ebdfbdb4ccebf0ac88267

Malware Config

Targets

    • Target

      4e42ecf4212ecc0075c89a03dd7d5dd0f2fd14b97b6dba6dfe32ee2905e352bb

    • Size

      820KB

    • MD5

      5437fb9ceca6cef775bd8ffc336645ec

    • SHA1

      4f0b0209ef0dd46f8cc9d575209a87db4b751434

    • SHA256

      4e42ecf4212ecc0075c89a03dd7d5dd0f2fd14b97b6dba6dfe32ee2905e352bb

    • SHA512

      97a26229274b4e61a44641b6e6c4e5377367e32e4f8fe2ac9c15b3726aa5fc75dada2864d2da46e7ed7eb5dcadbb82f95bac0a1eb12ebdfbdb4ccebf0ac88267

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks