General

  • Target

    6e90088bb8cc71fcebb71469a7e5668a0b6aacfa21fb274febbb523a427d8e40

  • Size

    1.3MB

  • Sample

    211126-lfx43segf4

  • MD5

    95a8147f694adad1655a2a158ba6d369

  • SHA1

    2911097d1da2ab8d364309a339f0f9afc78375ee

  • SHA256

    6e90088bb8cc71fcebb71469a7e5668a0b6aacfa21fb274febbb523a427d8e40

  • SHA512

    e7a184b61894a1ea414bc362fc6a37f7941d0ac91e07681dbaa2604930c126a88993c0562abcc579112554eb1fbb23f592d4cb5ebafb88724f5f9e921fbaf93f

Malware Config

Targets

    • Target

      6e90088bb8cc71fcebb71469a7e5668a0b6aacfa21fb274febbb523a427d8e40

    • Size

      1.3MB

    • MD5

      95a8147f694adad1655a2a158ba6d369

    • SHA1

      2911097d1da2ab8d364309a339f0f9afc78375ee

    • SHA256

      6e90088bb8cc71fcebb71469a7e5668a0b6aacfa21fb274febbb523a427d8e40

    • SHA512

      e7a184b61894a1ea414bc362fc6a37f7941d0ac91e07681dbaa2604930c126a88993c0562abcc579112554eb1fbb23f592d4cb5ebafb88724f5f9e921fbaf93f

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks