General

  • Target

    9303d54f40b9c7f56d95a0aa39078f0878cab85d0b63e6f4b727749253013d8d

  • Size

    1.3MB

  • Sample

    220323-jz4pvsedej

  • MD5

    26c6fe63e7b7ddbbe73a97520ea5d93c

  • SHA1

    8787e8c20838eea270f4a1e11cf0da706ff610ad

  • SHA256

    9303d54f40b9c7f56d95a0aa39078f0878cab85d0b63e6f4b727749253013d8d

  • SHA512

    bd70c8df00cc74e83978cd958e53ca53d8b7a4908c6d673c33c090c7c76eee10a3264c70594d7380ab3ee811fff28511dde98314c9f58d9f42caa468294fe1d8

Malware Config

Targets

    • Target

      9303d54f40b9c7f56d95a0aa39078f0878cab85d0b63e6f4b727749253013d8d

    • Size

      1.3MB

    • MD5

      26c6fe63e7b7ddbbe73a97520ea5d93c

    • SHA1

      8787e8c20838eea270f4a1e11cf0da706ff610ad

    • SHA256

      9303d54f40b9c7f56d95a0aa39078f0878cab85d0b63e6f4b727749253013d8d

    • SHA512

      bd70c8df00cc74e83978cd958e53ca53d8b7a4908c6d673c33c090c7c76eee10a3264c70594d7380ab3ee811fff28511dde98314c9f58d9f42caa468294fe1d8

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks