General

  • Target

    3e8094c9c90760a0cfde4ee4f6009a00559e6fc776b255c58f589c3d31c4dde2

  • Size

    687KB

  • Sample

    220417-t3vlgadge2

  • MD5

    2e72504c85d431114f47490953c13451

  • SHA1

    b3d121ae4b85ea4a23d10f743bac6828f74c5b12

  • SHA256

    3e8094c9c90760a0cfde4ee4f6009a00559e6fc776b255c58f589c3d31c4dde2

  • SHA512

    b8d489ffcedca0f9776de3ab631ec6f9e4aa8ce3f3a554d7e53bafa85723ea1176ae6015180ff200f37dd5fef689582103e7cb5ea2f58abbc908cb5312af7b7e

Malware Config

Targets

    • Target

      3e8094c9c90760a0cfde4ee4f6009a00559e6fc776b255c58f589c3d31c4dde2

    • Size

      687KB

    • MD5

      2e72504c85d431114f47490953c13451

    • SHA1

      b3d121ae4b85ea4a23d10f743bac6828f74c5b12

    • SHA256

      3e8094c9c90760a0cfde4ee4f6009a00559e6fc776b255c58f589c3d31c4dde2

    • SHA512

      b8d489ffcedca0f9776de3ab631ec6f9e4aa8ce3f3a554d7e53bafa85723ea1176ae6015180ff200f37dd5fef689582103e7cb5ea2f58abbc908cb5312af7b7e

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Payload

      Detects Dridex x64 core DLL in memory.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks