General

  • Target

    f27c709a754b0eb4218667cc87d1a36c5136c04656df54b50044e9695c74dea0

  • Size

    804KB

  • Sample

    210930-np1bxahegn

  • MD5

    85a3a7d5e2bfffd735526507797c7f74

  • SHA1

    1958d61c242c08726f52da03b8e048a3f6740ed2

  • SHA256

    f27c709a754b0eb4218667cc87d1a36c5136c04656df54b50044e9695c74dea0

  • SHA512

    8bdb1218eeb79e6f3a41c45239015be99743bd38cf60e34efc5ee4c99ff4046b56189240afb251cedf30012baf4599cf9bdb8c568dc529468fb2b49394d8f002

Malware Config

Targets

    • Target

      f27c709a754b0eb4218667cc87d1a36c5136c04656df54b50044e9695c74dea0

    • Size

      804KB

    • MD5

      85a3a7d5e2bfffd735526507797c7f74

    • SHA1

      1958d61c242c08726f52da03b8e048a3f6740ed2

    • SHA256

      f27c709a754b0eb4218667cc87d1a36c5136c04656df54b50044e9695c74dea0

    • SHA512

      8bdb1218eeb79e6f3a41c45239015be99743bd38cf60e34efc5ee4c99ff4046b56189240afb251cedf30012baf4599cf9bdb8c568dc529468fb2b49394d8f002

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks