General

  • Target

    336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b

  • Size

    804KB

  • Sample

    210930-npfmhahegm

  • MD5

    9c43c369c752cd67072cf89eccbe29cd

  • SHA1

    47505b5142506ac934d3960d4d9c638565bf885f

  • SHA256

    336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b

  • SHA512

    20694328a13e0debfaebda9c21393458c6a37b4d475aea0183a2099b752050209c3ddd5081f521a09b8c06aa8b39a453a1771dac2d84b0d0d3919d4a278e733e

Malware Config

Targets

    • Target

      336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b

    • Size

      804KB

    • MD5

      9c43c369c752cd67072cf89eccbe29cd

    • SHA1

      47505b5142506ac934d3960d4d9c638565bf885f

    • SHA256

      336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b

    • SHA512

      20694328a13e0debfaebda9c21393458c6a37b4d475aea0183a2099b752050209c3ddd5081f521a09b8c06aa8b39a453a1771dac2d84b0d0d3919d4a278e733e

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks