General

  • Target

    30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46

  • Size

    969KB

  • Sample

    220419-ewybfsbfck

  • MD5

    cfc7e196da21d39bd421129550403f36

  • SHA1

    fbf099967e30871fc4f12c9b448b988aefbeafb5

  • SHA256

    30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46

  • SHA512

    29ed93906917a1d12151e561a93118fc4278787f6cd7b471136ff22643b1da032441d86b8687c445352774c32dc7cc563ec4759f51b24ac13a8d6dc81ed6ab6a

Malware Config

Targets

    • Target

      30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46

    • Size

      969KB

    • MD5

      cfc7e196da21d39bd421129550403f36

    • SHA1

      fbf099967e30871fc4f12c9b448b988aefbeafb5

    • SHA256

      30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46

    • SHA512

      29ed93906917a1d12151e561a93118fc4278787f6cd7b471136ff22643b1da032441d86b8687c445352774c32dc7cc563ec4759f51b24ac13a8d6dc81ed6ab6a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks