d53f4a066d6a3d7b6f55ede5e054b04747a662d50c5765abbd3a48fb638a6248

General
Target

d53f4a066d6a3d7b6f55ede5e054b04747a662d50c5765abbd3a48fb638a6248

Size

1MB

Sample

211126-lfc4xaege4

Score
10 /10
MD5

3dac09bac7c22bd4e97528dcec777a67

SHA1

9dd5b0604a06b696d8a797188c46e39c1883ab73

SHA256

d53f4a066d6a3d7b6f55ede5e054b04747a662d50c5765abbd3a48fb638a6248

SHA512

a2500cd03137ba641ba7f93fc66d67eb81e81269e85c236f563891bda533473cf23018eb005f8198180a4c04bb9bba8718344d637c066535b7dc491f46e74240

Malware Config
Targets
Target

d53f4a066d6a3d7b6f55ede5e054b04747a662d50c5765abbd3a48fb638a6248

MD5

3dac09bac7c22bd4e97528dcec777a67

Filesize

1MB

Score
10/10
SHA1

9dd5b0604a06b696d8a797188c46e39c1883ab73

SHA256

d53f4a066d6a3d7b6f55ede5e054b04747a662d50c5765abbd3a48fb638a6248

SHA512

a2500cd03137ba641ba7f93fc66d67eb81e81269e85c236f563891bda533473cf23018eb005f8198180a4c04bb9bba8718344d637c066535b7dc491f46e74240

Tags

Signatures

  • Dridex

    Description

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    Tags

  • Dridex Shellcode

    Description

    Detects Dridex Payload shellcode injected in Explorer process.

    Tags

  • Executes dropped EXE

  • Loads dropped DLL

  • Adds Run key to start application

    Tags

    TTPs

    Registry Run Keys / Startup FolderModify Registry
  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Privilege Escalation