General

  • Target

    e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b

  • Size

    1.2MB

  • Sample

    211126-lg4cgsbehl

  • MD5

    f013bd186a7cc04178679a1b24b7ef64

  • SHA1

    30dd7d35772cfe50cac035ecb21e3ea8e17551db

  • SHA256

    e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b

  • SHA512

    d8c9ad1efc9f04975590d64e21c132cdf0e301558f69321f07211716aedf1b9dfd4974660c1638e443ae331422d2be1f5d9d493129a3af21b16f1ca47d1ee79b

Malware Config

Targets

    • Target

      e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b

    • Size

      1.2MB

    • MD5

      f013bd186a7cc04178679a1b24b7ef64

    • SHA1

      30dd7d35772cfe50cac035ecb21e3ea8e17551db

    • SHA256

      e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b

    • SHA512

      d8c9ad1efc9f04975590d64e21c132cdf0e301558f69321f07211716aedf1b9dfd4974660c1638e443ae331422d2be1f5d9d493129a3af21b16f1ca47d1ee79b

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks