General

  • Target

    ac789285c91a1777f5c5cfb1e0c6d93f1a06856849ef005f471cb6641b05a8ee

  • Size

    1.2MB

  • Sample

    220417-t25p2sahdp

  • MD5

    bd42ea33dfc75bbbc8e5b537fc14ac6d

  • SHA1

    bf81af779374bfd5bc6caf97524e549541025a56

  • SHA256

    ac789285c91a1777f5c5cfb1e0c6d93f1a06856849ef005f471cb6641b05a8ee

  • SHA512

    78f92d35c6d8f1a7c79293d52d4f6ba13d2ad8d4cc018ede2e4d4c78392b94e384c86b6626c062bcf1a2f44f95eb28d60342565ed497a5166ef43a181dc41b43

Malware Config

Targets

    • Target

      ac789285c91a1777f5c5cfb1e0c6d93f1a06856849ef005f471cb6641b05a8ee

    • Size

      1.2MB

    • MD5

      bd42ea33dfc75bbbc8e5b537fc14ac6d

    • SHA1

      bf81af779374bfd5bc6caf97524e549541025a56

    • SHA256

      ac789285c91a1777f5c5cfb1e0c6d93f1a06856849ef005f471cb6641b05a8ee

    • SHA512

      78f92d35c6d8f1a7c79293d52d4f6ba13d2ad8d4cc018ede2e4d4c78392b94e384c86b6626c062bcf1a2f44f95eb28d60342565ed497a5166ef43a181dc41b43

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks