General

  • Target

    71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1

  • Size

    693KB

  • Sample

    220417-t3tzyaahfl

  • MD5

    7c62918ed4a99483c0766db2fdafe75c

  • SHA1

    2bee00c0b9ee71667da7a7ec57aac1d0cca147d0

  • SHA256

    71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1

  • SHA512

    b76cd8d4b5a27cc6ad17ff1a17c80f2f5bc182f6594a214df7eee4ceec339ad78014fdf6afddf1f4e6be3bc78248c02344f27b0c96d86d49d86b4cd191af5cc4

Malware Config

Targets

    • Target

      71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1

    • Size

      693KB

    • MD5

      7c62918ed4a99483c0766db2fdafe75c

    • SHA1

      2bee00c0b9ee71667da7a7ec57aac1d0cca147d0

    • SHA256

      71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1

    • SHA512

      b76cd8d4b5a27cc6ad17ff1a17c80f2f5bc182f6594a214df7eee4ceec339ad78014fdf6afddf1f4e6be3bc78248c02344f27b0c96d86d49d86b4cd191af5cc4

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks