General

  • Target

    668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed

  • Size

    1003KB

  • Sample

    220417-t3aajadgc4

  • MD5

    218d477824d47647d4b594fba6c72d16

  • SHA1

    e1321bb45459d5a414d8816eb354a55ac4dd7610

  • SHA256

    668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed

  • SHA512

    96674362aff08b3de475809fddf3a918d23da6ed34202975e6c268b417bacd98c097fe9455aa45443296f20e1ca16095bf47a8d36e90d53eb48fb427dfe30503

Malware Config

Targets

    • Target

      668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed

    • Size

      1003KB

    • MD5

      218d477824d47647d4b594fba6c72d16

    • SHA1

      e1321bb45459d5a414d8816eb354a55ac4dd7610

    • SHA256

      668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed

    • SHA512

      96674362aff08b3de475809fddf3a918d23da6ed34202975e6c268b417bacd98c097fe9455aa45443296f20e1ca16095bf47a8d36e90d53eb48fb427dfe30503

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks