General

  • Target

    3e01cc84e691f32494b07ecb3468cbb5d9c085488fe0a5b8110f80071fcaf180

  • Size

    1.2MB

  • Sample

    211126-lhq4jsbfaj

  • MD5

    93c7117d555fe4e4790b02958ddcee41

  • SHA1

    d7eaacfdc572f9bcdb295eae11881fffe72b0a43

  • SHA256

    3e01cc84e691f32494b07ecb3468cbb5d9c085488fe0a5b8110f80071fcaf180

  • SHA512

    9cd85e1eebbed1adfd5f56a9b72dd719f506b7dfbba798581776b1a310d8bd140441c345006d4792467616cb7b4c94ada7689bf3e10de72dac9a1bac1047226c

Malware Config

Targets

    • Target

      3e01cc84e691f32494b07ecb3468cbb5d9c085488fe0a5b8110f80071fcaf180

    • Size

      1.2MB

    • MD5

      93c7117d555fe4e4790b02958ddcee41

    • SHA1

      d7eaacfdc572f9bcdb295eae11881fffe72b0a43

    • SHA256

      3e01cc84e691f32494b07ecb3468cbb5d9c085488fe0a5b8110f80071fcaf180

    • SHA512

      9cd85e1eebbed1adfd5f56a9b72dd719f506b7dfbba798581776b1a310d8bd140441c345006d4792467616cb7b4c94ada7689bf3e10de72dac9a1bac1047226c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks