General

  • Target

    114c890f736efbfef6a5d5bfe69d10f3b98b5cf919b25536bff9dd7ba2738fc6

  • Size

    1.5MB

  • Sample

    211126-ld769sbecq

  • MD5

    32f0105f83bb61e4fd688219dca080c0

  • SHA1

    4de49a52dd511040dc5d36703966d6b0fe9075a7

  • SHA256

    114c890f736efbfef6a5d5bfe69d10f3b98b5cf919b25536bff9dd7ba2738fc6

  • SHA512

    28556df31e2299904d61ddb80b3ef334c23a40f16bca1f0cfb395c4fe472dfe9ea37d978e44c2d2443f75e77870a4d88ccc197bd1e54462e89c44de7e733e6ec

Malware Config

Targets

    • Target

      114c890f736efbfef6a5d5bfe69d10f3b98b5cf919b25536bff9dd7ba2738fc6

    • Size

      1.5MB

    • MD5

      32f0105f83bb61e4fd688219dca080c0

    • SHA1

      4de49a52dd511040dc5d36703966d6b0fe9075a7

    • SHA256

      114c890f736efbfef6a5d5bfe69d10f3b98b5cf919b25536bff9dd7ba2738fc6

    • SHA512

      28556df31e2299904d61ddb80b3ef334c23a40f16bca1f0cfb395c4fe472dfe9ea37d978e44c2d2443f75e77870a4d88ccc197bd1e54462e89c44de7e733e6ec

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks