General

  • Target

    559ea4cd5ccedae2401361426823b4c92046f9f997e78b9cf9a1c1e31f9b79c9

  • Size

    1.2MB

  • Sample

    211126-lgl37segg3

  • MD5

    366013530a4b95379a78c2fdb73c57bc

  • SHA1

    ef3d3ab238a9c130efde5d42a25d6da283fb32b4

  • SHA256

    559ea4cd5ccedae2401361426823b4c92046f9f997e78b9cf9a1c1e31f9b79c9

  • SHA512

    d069b330242c8ec15975e4ff601b6c4a6cadf43a3ea36193c3e616e0f13602d51a4ef72a8af59a7989eb4d3e126b87436280f5457787bddfe430899600113ead

Malware Config

Targets

    • Target

      559ea4cd5ccedae2401361426823b4c92046f9f997e78b9cf9a1c1e31f9b79c9

    • Size

      1.2MB

    • MD5

      366013530a4b95379a78c2fdb73c57bc

    • SHA1

      ef3d3ab238a9c130efde5d42a25d6da283fb32b4

    • SHA256

      559ea4cd5ccedae2401361426823b4c92046f9f997e78b9cf9a1c1e31f9b79c9

    • SHA512

      d069b330242c8ec15975e4ff601b6c4a6cadf43a3ea36193c3e616e0f13602d51a4ef72a8af59a7989eb4d3e126b87436280f5457787bddfe430899600113ead

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks