General

  • Target

    8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60

  • Size

    970KB

  • Sample

    220417-t27veadgb9

  • MD5

    c57bd52b697bb4e7d84966e7e1060dcf

  • SHA1

    bcae0790539d3753a5ddf7707a12068c3733a3b2

  • SHA256

    8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60

  • SHA512

    61d3830fe1d54f80ef1a5cb03f272f9148f897ceb132537c66117a287770fe48dc74a1a3e291c011c18c467ebeaf73b3b9f79802760bc6d8504b0ccd02cd3f0a

Malware Config

Targets

    • Target

      8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60

    • Size

      970KB

    • MD5

      c57bd52b697bb4e7d84966e7e1060dcf

    • SHA1

      bcae0790539d3753a5ddf7707a12068c3733a3b2

    • SHA256

      8cf6c8d142639514e363103f0e9768f4847b0068c2eae252c45c782c5773ab60

    • SHA512

      61d3830fe1d54f80ef1a5cb03f272f9148f897ceb132537c66117a287770fe48dc74a1a3e291c011c18c467ebeaf73b3b9f79802760bc6d8504b0ccd02cd3f0a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks