General

  • Target

    d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa

  • Size

    1.4MB

  • Sample

    211126-lerwnsbedp

  • MD5

    596b0cac5ca82de0f301f5ae4f72ec31

  • SHA1

    ef280c3f84f2aa68dac81b7c511a55d18035c644

  • SHA256

    d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa

  • SHA512

    344a058bd165805bb442eb0ccd07a61349c0283a32ec502447c32a408dc17cf0a303422ffe3fb535fa80716584a8735eaca57adb67faf44ba52b966a007f6bcb

Malware Config

Targets

    • Target

      d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa

    • Size

      1.4MB

    • MD5

      596b0cac5ca82de0f301f5ae4f72ec31

    • SHA1

      ef280c3f84f2aa68dac81b7c511a55d18035c644

    • SHA256

      d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa

    • SHA512

      344a058bd165805bb442eb0ccd07a61349c0283a32ec502447c32a408dc17cf0a303422ffe3fb535fa80716584a8735eaca57adb67faf44ba52b966a007f6bcb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks