General

  • Target

    f8a764a3f99993f4b6042719d93a5f2f39638bde7bc04223fcb546aa3347e3e4

  • Size

    1.2MB

  • Sample

    220419-ew3k6sbfdk

  • MD5

    c50408c64af413bf14ee924055a2b917

  • SHA1

    c9fa32505e6e82a0dea5e40a202b37dc6d3f5ada

  • SHA256

    f8a764a3f99993f4b6042719d93a5f2f39638bde7bc04223fcb546aa3347e3e4

  • SHA512

    d76f14df79e7cbdbeef2afdeed61f54eeafdfd99a84eeac0b6e039c7835114e86cf2ce7ae6043af296cee719bcfe4f2ab519328545bb836002e8279eab95b301

Malware Config

Targets

    • Target

      f8a764a3f99993f4b6042719d93a5f2f39638bde7bc04223fcb546aa3347e3e4

    • Size

      1.2MB

    • MD5

      c50408c64af413bf14ee924055a2b917

    • SHA1

      c9fa32505e6e82a0dea5e40a202b37dc6d3f5ada

    • SHA256

      f8a764a3f99993f4b6042719d93a5f2f39638bde7bc04223fcb546aa3347e3e4

    • SHA512

      d76f14df79e7cbdbeef2afdeed61f54eeafdfd99a84eeac0b6e039c7835114e86cf2ce7ae6043af296cee719bcfe4f2ab519328545bb836002e8279eab95b301

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks