General

  • Target

    7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b

  • Size

    689KB

  • Sample

    220417-t3rvksdgd9

  • MD5

    7dfb4ba2bd6af9d1d873f7570227c944

  • SHA1

    a4ba8288d9ce7f64dc7af457222783131ccbb120

  • SHA256

    7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b

  • SHA512

    bbef51d5be2ac929e525e9a096480c1e76b5e59475730dbaa84de2d3efeb24e29fd66910149ae2a5e408a513e303a1886de7052d642d59d89e4ccf3d175d0244

Malware Config

Targets

    • Target

      7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b

    • Size

      689KB

    • MD5

      7dfb4ba2bd6af9d1d873f7570227c944

    • SHA1

      a4ba8288d9ce7f64dc7af457222783131ccbb120

    • SHA256

      7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b

    • SHA512

      bbef51d5be2ac929e525e9a096480c1e76b5e59475730dbaa84de2d3efeb24e29fd66910149ae2a5e408a513e303a1886de7052d642d59d89e4ccf3d175d0244

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks