General

  • Target

    b8eeb8c59a0b5352f8c313e727fddb899875960df029eaca7e868610702cfaf0

  • Size

    1.2MB

  • Sample

    220417-t2368aahdn

  • MD5

    754bb938d40d9602980e2e9ec5a4e927

  • SHA1

    45b9def51ab5c99967127db3ed203ebeced50cc3

  • SHA256

    b8eeb8c59a0b5352f8c313e727fddb899875960df029eaca7e868610702cfaf0

  • SHA512

    87cd8995040a8f487f7ae45d4d0f31b658504c6060acd7c3948c8bd1c27ceb67045882bf73dd541ab05421089a7addff0b0318fd85f78c117a6acdc2a86264c2

Malware Config

Targets

    • Target

      b8eeb8c59a0b5352f8c313e727fddb899875960df029eaca7e868610702cfaf0

    • Size

      1.2MB

    • MD5

      754bb938d40d9602980e2e9ec5a4e927

    • SHA1

      45b9def51ab5c99967127db3ed203ebeced50cc3

    • SHA256

      b8eeb8c59a0b5352f8c313e727fddb899875960df029eaca7e868610702cfaf0

    • SHA512

      87cd8995040a8f487f7ae45d4d0f31b658504c6060acd7c3948c8bd1c27ceb67045882bf73dd541ab05421089a7addff0b0318fd85f78c117a6acdc2a86264c2

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks