General

  • Target

    8a4e80e4a3f944c227eb6889457ef30477e7cdc96e1b387773d14e2bab450933

  • Size

    1.3MB

  • Sample

    211126-lfxhjsbeer

  • MD5

    bf1839ade874f6ca04aa9e4a7783a6d1

  • SHA1

    64db32760738546c971c06b7c8af9747a37054c3

  • SHA256

    8a4e80e4a3f944c227eb6889457ef30477e7cdc96e1b387773d14e2bab450933

  • SHA512

    852bea55d00fae406f9c98c0d4d6a346281b69b12429d67caadb056035a1f874777bbf0acee72a86d934c046ca84022ed4bcbbfd9e78d4b33e69f51c265c37fa

Malware Config

Targets

    • Target

      8a4e80e4a3f944c227eb6889457ef30477e7cdc96e1b387773d14e2bab450933

    • Size

      1.3MB

    • MD5

      bf1839ade874f6ca04aa9e4a7783a6d1

    • SHA1

      64db32760738546c971c06b7c8af9747a37054c3

    • SHA256

      8a4e80e4a3f944c227eb6889457ef30477e7cdc96e1b387773d14e2bab450933

    • SHA512

      852bea55d00fae406f9c98c0d4d6a346281b69b12429d67caadb056035a1f874777bbf0acee72a86d934c046ca84022ed4bcbbfd9e78d4b33e69f51c265c37fa

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks