General

  • Target

    c595d93c190e487562ee3edb78b351567be676fa2fe73625c3e61985f656e204

  • Size

    1.4MB

  • Sample

    211126-lerkxaegd4

  • MD5

    b10d7d1c405f81de7d52bff6a6feb9ab

  • SHA1

    14c1d523e1e0a7fad2016534ef731c546f365fe9

  • SHA256

    c595d93c190e487562ee3edb78b351567be676fa2fe73625c3e61985f656e204

  • SHA512

    5245c50ecc4aeb4768e123c001965378cd8a8e20ace024657490db9b371314543c10412a1c93b941bd8308daec81c8a9aa106a67a580ca6fa429d42ba9cc0303

Malware Config

Targets

    • Target

      c595d93c190e487562ee3edb78b351567be676fa2fe73625c3e61985f656e204

    • Size

      1.4MB

    • MD5

      b10d7d1c405f81de7d52bff6a6feb9ab

    • SHA1

      14c1d523e1e0a7fad2016534ef731c546f365fe9

    • SHA256

      c595d93c190e487562ee3edb78b351567be676fa2fe73625c3e61985f656e204

    • SHA512

      5245c50ecc4aeb4768e123c001965378cd8a8e20ace024657490db9b371314543c10412a1c93b941bd8308daec81c8a9aa106a67a580ca6fa429d42ba9cc0303

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks