General

  • Target

    ea76ebecb809e4b915523658ddd2263dd0d3b0ed946d2d32c4459a818c182440

  • Size

    622KB

  • Sample

    220417-t3e6saahel

  • MD5

    a70f5490f5e1b1e59dc712664988cd2b

  • SHA1

    66a09623bf9466c15487ca11011675ffe28f238f

  • SHA256

    ea76ebecb809e4b915523658ddd2263dd0d3b0ed946d2d32c4459a818c182440

  • SHA512

    d31b4d9c7924f330258448b4dec51f41464f935d208fc7c90105eb47fc5a9ff15dec0fd0874742be6b26abc0972140066bdacb7c37bb0038f52e98cdd01afefd

Malware Config

Targets

    • Target

      ea76ebecb809e4b915523658ddd2263dd0d3b0ed946d2d32c4459a818c182440

    • Size

      622KB

    • MD5

      a70f5490f5e1b1e59dc712664988cd2b

    • SHA1

      66a09623bf9466c15487ca11011675ffe28f238f

    • SHA256

      ea76ebecb809e4b915523658ddd2263dd0d3b0ed946d2d32c4459a818c182440

    • SHA512

      d31b4d9c7924f330258448b4dec51f41464f935d208fc7c90105eb47fc5a9ff15dec0fd0874742be6b26abc0972140066bdacb7c37bb0038f52e98cdd01afefd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks