General

  • Target

    6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14

  • Size

    965KB

  • Sample

    220419-ewn3sabfal

  • MD5

    8c626b0730876bc39bfad224fb742d3f

  • SHA1

    b998aa15b53814de5407c2048440786dbcecd572

  • SHA256

    6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14

  • SHA512

    4ec780d3061245e18cb36268df014325142c9894ce59e33fcd9a87605afcfb872aa0aa53f09a76a2152004d7a0a20ab3e3438b952756c1bf4004b3b442082092

Malware Config

Targets

    • Target

      6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14

    • Size

      965KB

    • MD5

      8c626b0730876bc39bfad224fb742d3f

    • SHA1

      b998aa15b53814de5407c2048440786dbcecd572

    • SHA256

      6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14

    • SHA512

      4ec780d3061245e18cb36268df014325142c9894ce59e33fcd9a87605afcfb872aa0aa53f09a76a2152004d7a0a20ab3e3438b952756c1bf4004b3b442082092

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks