General

  • Target

    899cac1d02beb489b43a5aad1ef87609f3783d891def8f5fd122d848c71da5fb

  • Size

    1.3MB

  • Sample

    211126-lfxtbabefl

  • MD5

    cd87697a9e2bdfac82d9b7154c3105ce

  • SHA1

    963e78487647a3b7199211154b8fe7f6babe6bbb

  • SHA256

    899cac1d02beb489b43a5aad1ef87609f3783d891def8f5fd122d848c71da5fb

  • SHA512

    ab1617bd35d7f07eb819ae467284985ea241d9e0c019970e5a5f0cd42a8b3eadb0ac3ea16d35a056620784c65f9b9b20410b39aa23c3119b6ddad2cfbe5400db

Malware Config

Targets

    • Target

      899cac1d02beb489b43a5aad1ef87609f3783d891def8f5fd122d848c71da5fb

    • Size

      1.3MB

    • MD5

      cd87697a9e2bdfac82d9b7154c3105ce

    • SHA1

      963e78487647a3b7199211154b8fe7f6babe6bbb

    • SHA256

      899cac1d02beb489b43a5aad1ef87609f3783d891def8f5fd122d848c71da5fb

    • SHA512

      ab1617bd35d7f07eb819ae467284985ea241d9e0c019970e5a5f0cd42a8b3eadb0ac3ea16d35a056620784c65f9b9b20410b39aa23c3119b6ddad2cfbe5400db

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks