General

  • Target

    076e78d17a3bba27225ed654145b83f73563a85d568287fd22fbcb3f6aaed049

  • Size

    1.3MB

  • Sample

    211126-lglsfaegf7

  • MD5

    a5d99a124590b06e72d07c3371875c1c

  • SHA1

    9ec7c5ed0795e3631bd8445428b3385586789a62

  • SHA256

    076e78d17a3bba27225ed654145b83f73563a85d568287fd22fbcb3f6aaed049

  • SHA512

    def205a46b1ddf95d3e7d28ef94a9f87a5759e3f325241e7ae4cbcfae88c4e9fad0a25f9d506010a040f1c0829df4ff7d25a405a3fce5296184c81d6e99ab6c2

Malware Config

Targets

    • Target

      076e78d17a3bba27225ed654145b83f73563a85d568287fd22fbcb3f6aaed049

    • Size

      1.3MB

    • MD5

      a5d99a124590b06e72d07c3371875c1c

    • SHA1

      9ec7c5ed0795e3631bd8445428b3385586789a62

    • SHA256

      076e78d17a3bba27225ed654145b83f73563a85d568287fd22fbcb3f6aaed049

    • SHA512

      def205a46b1ddf95d3e7d28ef94a9f87a5759e3f325241e7ae4cbcfae88c4e9fad0a25f9d506010a040f1c0829df4ff7d25a405a3fce5296184c81d6e99ab6c2

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks