General

  • Target

    d613a07d9ea513fbfb187dd4fa6baee901de7a2217fd3e69dd7539efbd602f88

  • Size

    1.7MB

  • Sample

    211006-g4dywsafb9

  • MD5

    2465cd00de8a884ccbf278484a269100

  • SHA1

    873c9d37af344388bd010f416b5367864575bd4a

  • SHA256

    d613a07d9ea513fbfb187dd4fa6baee901de7a2217fd3e69dd7539efbd602f88

  • SHA512

    a2d89bfdf259be0e96abfcbfabde849ab8c3355c153baf47639b85287496a8d1512c6b7cdf7100de2daf5e0e476d4637a31cdc11252630a504fe6a3c36101c35

Malware Config

Targets

    • Target

      d613a07d9ea513fbfb187dd4fa6baee901de7a2217fd3e69dd7539efbd602f88

    • Size

      1.7MB

    • MD5

      2465cd00de8a884ccbf278484a269100

    • SHA1

      873c9d37af344388bd010f416b5367864575bd4a

    • SHA256

      d613a07d9ea513fbfb187dd4fa6baee901de7a2217fd3e69dd7539efbd602f88

    • SHA512

      a2d89bfdf259be0e96abfcbfabde849ab8c3355c153baf47639b85287496a8d1512c6b7cdf7100de2daf5e0e476d4637a31cdc11252630a504fe6a3c36101c35

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks