General

  • Target

    3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d

  • Size

    967KB

  • Sample

    220419-ewt9ssbfbm

  • MD5

    9634f1a7a6036a22b6ad86a1a671ad58

  • SHA1

    2b8e333675aaa8b8211cbbd56bcf8996d0380b92

  • SHA256

    3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d

  • SHA512

    b73d2053f4ee906be366ae8631833cc9ce5837234768f7796cfb4f3c5eccebb78767191f16165303cddfec4706ed9669c348d7e2bafe1d98d8a1e62c7e8ff61a

Malware Config

Targets

    • Target

      3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d

    • Size

      967KB

    • MD5

      9634f1a7a6036a22b6ad86a1a671ad58

    • SHA1

      2b8e333675aaa8b8211cbbd56bcf8996d0380b92

    • SHA256

      3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d

    • SHA512

      b73d2053f4ee906be366ae8631833cc9ce5837234768f7796cfb4f3c5eccebb78767191f16165303cddfec4706ed9669c348d7e2bafe1d98d8a1e62c7e8ff61a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks