General

  • Target

    cd32d58ca3e18c0b8bf13f069e85a5115d70df749de0cd9405cdf7bec2af17e1

  • Size

    1.7MB

  • Sample

    211006-g4dywsafc2

  • MD5

    61c65da8e6b2564d62679ebee843c61c

  • SHA1

    36dee97e7ad734287da63e11177ddf76b97222d9

  • SHA256

    cd32d58ca3e18c0b8bf13f069e85a5115d70df749de0cd9405cdf7bec2af17e1

  • SHA512

    26fe48e15d0361f52551185deb94212c50427651b7b5e9f211d83b7ef90c4a1b42b7d26772554bf191830dbd6d5421d5b66d2f56e20d0ad78a694b91df5f24a8

Malware Config

Targets

    • Target

      cd32d58ca3e18c0b8bf13f069e85a5115d70df749de0cd9405cdf7bec2af17e1

    • Size

      1.7MB

    • MD5

      61c65da8e6b2564d62679ebee843c61c

    • SHA1

      36dee97e7ad734287da63e11177ddf76b97222d9

    • SHA256

      cd32d58ca3e18c0b8bf13f069e85a5115d70df749de0cd9405cdf7bec2af17e1

    • SHA512

      26fe48e15d0361f52551185deb94212c50427651b7b5e9f211d83b7ef90c4a1b42b7d26772554bf191830dbd6d5421d5b66d2f56e20d0ad78a694b91df5f24a8

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks