General

  • Target

    2f7f63c6ba9e9a2cb5621c4be44f44df3d911aac1b57f240f60da951c69b4714

  • Size

    812KB

  • Sample

    210930-njvjgahefn

  • MD5

    6be35a004b38f1d462da7b67095416f3

  • SHA1

    38ddcc25df9db0bb5fbd8b84587af98ebde0ab64

  • SHA256

    2f7f63c6ba9e9a2cb5621c4be44f44df3d911aac1b57f240f60da951c69b4714

  • SHA512

    52b9c890d58086e22004dccae0e6ea95ef851e9dd6c342689cfe5ddb130be483dc44f3ef6a8af990c67443e37a92be8026268b7f1d2f142119c34a797c0f4679

Malware Config

Targets

    • Target

      2f7f63c6ba9e9a2cb5621c4be44f44df3d911aac1b57f240f60da951c69b4714

    • Size

      812KB

    • MD5

      6be35a004b38f1d462da7b67095416f3

    • SHA1

      38ddcc25df9db0bb5fbd8b84587af98ebde0ab64

    • SHA256

      2f7f63c6ba9e9a2cb5621c4be44f44df3d911aac1b57f240f60da951c69b4714

    • SHA512

      52b9c890d58086e22004dccae0e6ea95ef851e9dd6c342689cfe5ddb130be483dc44f3ef6a8af990c67443e37a92be8026268b7f1d2f142119c34a797c0f4679

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks