General

  • Target

    cb793c295b0bcd3baec5546b7176cdfdf10b0a9291d958c72eb85551825d22d6

  • Size

    1.3MB

  • Sample

    220323-jz4pvsaaf3

  • MD5

    288c35481252c1212cbb764c490c2ad8

  • SHA1

    9c48ba2239b5ae5675d0eb6b92cf0a37884403fd

  • SHA256

    cb793c295b0bcd3baec5546b7176cdfdf10b0a9291d958c72eb85551825d22d6

  • SHA512

    8a3b343ad8819f09f94868b19ab6f94a6fdf852f3c5183a371cd323a57af0b7fb9d5249516044e8f59721e6220ecd43338b6990c56cb0006840842cb923be112

Malware Config

Targets

    • Target

      cb793c295b0bcd3baec5546b7176cdfdf10b0a9291d958c72eb85551825d22d6

    • Size

      1.3MB

    • MD5

      288c35481252c1212cbb764c490c2ad8

    • SHA1

      9c48ba2239b5ae5675d0eb6b92cf0a37884403fd

    • SHA256

      cb793c295b0bcd3baec5546b7176cdfdf10b0a9291d958c72eb85551825d22d6

    • SHA512

      8a3b343ad8819f09f94868b19ab6f94a6fdf852f3c5183a371cd323a57af0b7fb9d5249516044e8f59721e6220ecd43338b6990c56cb0006840842cb923be112

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks