General

  • Target

    07f5bfe8bd8448bed535b3e17ba4a771f8e22d79323409223904651b9c4f637c

  • Size

    882KB

  • Sample

    220417-h3wb8aadaj

  • MD5

    f7ebaa469f359428eb4c1ae559ccb5a5

  • SHA1

    60e9a7184c28f812116245bacf27d7105acc8572

  • SHA256

    07f5bfe8bd8448bed535b3e17ba4a771f8e22d79323409223904651b9c4f637c

  • SHA512

    84e919b0760df09406224fd669f448f34517170ae7f76a3013da389fccbb501a88f22b8451f83bb11f0bc22e7fc263b991c18bb9d0b86d88fd3839cd80b4c324

Malware Config

Targets

    • Target

      07f5bfe8bd8448bed535b3e17ba4a771f8e22d79323409223904651b9c4f637c

    • Size

      882KB

    • MD5

      f7ebaa469f359428eb4c1ae559ccb5a5

    • SHA1

      60e9a7184c28f812116245bacf27d7105acc8572

    • SHA256

      07f5bfe8bd8448bed535b3e17ba4a771f8e22d79323409223904651b9c4f637c

    • SHA512

      84e919b0760df09406224fd669f448f34517170ae7f76a3013da389fccbb501a88f22b8451f83bb11f0bc22e7fc263b991c18bb9d0b86d88fd3839cd80b4c324

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks