General

  • Target

    ff25e9f36e8267df94a51f3252cab735e329dd5d2d2a5a4a2a7cfb1c4f7858db

  • Size

    1.4MB

  • Sample

    211126-lerwnsegd7

  • MD5

    b833af54974479f3f905c09600bad9bb

  • SHA1

    c8b57a99795b1cd22a7f51ce398e5d2bddbf2d4c

  • SHA256

    ff25e9f36e8267df94a51f3252cab735e329dd5d2d2a5a4a2a7cfb1c4f7858db

  • SHA512

    f80147e8e3aabae23361d44e11b14316a80f9aeadaa4a53ee90beb1fc8b1268f0d83a1894eac198a1a64c14ee500c5f1d72c0d90d23f2d7c2e2474b70b08b669

Malware Config

Targets

    • Target

      ff25e9f36e8267df94a51f3252cab735e329dd5d2d2a5a4a2a7cfb1c4f7858db

    • Size

      1.4MB

    • MD5

      b833af54974479f3f905c09600bad9bb

    • SHA1

      c8b57a99795b1cd22a7f51ce398e5d2bddbf2d4c

    • SHA256

      ff25e9f36e8267df94a51f3252cab735e329dd5d2d2a5a4a2a7cfb1c4f7858db

    • SHA512

      f80147e8e3aabae23361d44e11b14316a80f9aeadaa4a53ee90beb1fc8b1268f0d83a1894eac198a1a64c14ee500c5f1d72c0d90d23f2d7c2e2474b70b08b669

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks