General

  • Target

    a35a441cebe6101f1b6c2bccc4ef43fb86e45374628763843f4992bcee41d58e

  • Size

    1.6MB

  • Sample

    211126-ld769sbecn

  • MD5

    6bad7f03803d4f94524b181c5d6506bb

  • SHA1

    93172fa64d9af49115ff46fda12470f698e618c3

  • SHA256

    a35a441cebe6101f1b6c2bccc4ef43fb86e45374628763843f4992bcee41d58e

  • SHA512

    120ee29297344139becdb72d771833180a344f5b01831bbe1e46ffae16673d3a2d4836ed43d69456c46c61f04f4323b1f7c60c4050e0e3102041d3feda133ed1

Malware Config

Targets

    • Target

      a35a441cebe6101f1b6c2bccc4ef43fb86e45374628763843f4992bcee41d58e

    • Size

      1.6MB

    • MD5

      6bad7f03803d4f94524b181c5d6506bb

    • SHA1

      93172fa64d9af49115ff46fda12470f698e618c3

    • SHA256

      a35a441cebe6101f1b6c2bccc4ef43fb86e45374628763843f4992bcee41d58e

    • SHA512

      120ee29297344139becdb72d771833180a344f5b01831bbe1e46ffae16673d3a2d4836ed43d69456c46c61f04f4323b1f7c60c4050e0e3102041d3feda133ed1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks