General

  • Target

    96f10e16e783acebd689db4f3e11b3b949badbd76e4ebf642a604314ce6df395

  • Size

    1.3MB

  • Sample

    211126-lfxtbaege8

  • MD5

    1f6485c87621bff97a63f506040b8288

  • SHA1

    43e5b5a0abf8ef0cbf6fc3ca95f009022b89dec4

  • SHA256

    96f10e16e783acebd689db4f3e11b3b949badbd76e4ebf642a604314ce6df395

  • SHA512

    48bfcf96bc030cc1e84d30d00c42c54abc5f144c4f550d803d8db207fcc0e1bcf65bc4510b39a1204f967bb8028218ded870319423ef72f6b6164963390c091c

Malware Config

Targets

    • Target

      96f10e16e783acebd689db4f3e11b3b949badbd76e4ebf642a604314ce6df395

    • Size

      1.3MB

    • MD5

      1f6485c87621bff97a63f506040b8288

    • SHA1

      43e5b5a0abf8ef0cbf6fc3ca95f009022b89dec4

    • SHA256

      96f10e16e783acebd689db4f3e11b3b949badbd76e4ebf642a604314ce6df395

    • SHA512

      48bfcf96bc030cc1e84d30d00c42c54abc5f144c4f550d803d8db207fcc0e1bcf65bc4510b39a1204f967bb8028218ded870319423ef72f6b6164963390c091c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks