General

  • Target

    551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c

  • Size

    1.2MB

  • Sample

    211126-lg32qaegh2

  • MD5

    0cea842b15be5b2e537ddfed28706abe

  • SHA1

    510fd4fba4122a2d5cea810cb8d90493ef9570e4

  • SHA256

    551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c

  • SHA512

    3aa534022e692349519019fdce5fd1b74aeea0f22e627627c795970deded152881d3ac3cab391e85fd0330b1cd91ed216c80a0a9b08a464ce59ac8a6dfea9960

Malware Config

Targets

    • Target

      551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c

    • Size

      1.2MB

    • MD5

      0cea842b15be5b2e537ddfed28706abe

    • SHA1

      510fd4fba4122a2d5cea810cb8d90493ef9570e4

    • SHA256

      551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c

    • SHA512

      3aa534022e692349519019fdce5fd1b74aeea0f22e627627c795970deded152881d3ac3cab391e85fd0330b1cd91ed216c80a0a9b08a464ce59ac8a6dfea9960

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks