General

  • Target

    e3a97ee2fa0ea4dc05340e0778674a93e8c95944c519df7ee5f486c08b1df15a.dll

  • Size

    1.2MB

  • Sample

    211203-mwmhysbbc4

  • MD5

    ea1bfbc91324c0cbb97f17775e653dab

  • SHA1

    61c6d875774c9cd59ae56e351a291c2cf9e79284

  • SHA256

    e3a97ee2fa0ea4dc05340e0778674a93e8c95944c519df7ee5f486c08b1df15a

  • SHA512

    903a180a93cc7ecd2b6e0fd76fc597456bbd1986d28f63993fc00b57dc47afad779fd05ce734f4070d3b16af08aec5e5da1086aefcf85929ba87c7cd1e27dc75

Malware Config

Targets

    • Target

      e3a97ee2fa0ea4dc05340e0778674a93e8c95944c519df7ee5f486c08b1df15a.dll

    • Size

      1.2MB

    • MD5

      ea1bfbc91324c0cbb97f17775e653dab

    • SHA1

      61c6d875774c9cd59ae56e351a291c2cf9e79284

    • SHA256

      e3a97ee2fa0ea4dc05340e0778674a93e8c95944c519df7ee5f486c08b1df15a

    • SHA512

      903a180a93cc7ecd2b6e0fd76fc597456bbd1986d28f63993fc00b57dc47afad779fd05ce734f4070d3b16af08aec5e5da1086aefcf85929ba87c7cd1e27dc75

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks