General

  • Target

    48dc546fd72839ba913d8df996713bf6f4026da395321e85d7a389ee632d4642

  • Size

    1.2MB

  • Sample

    220419-ex3bssbgcr

  • MD5

    7646f5ed5e19b61c8a94005ad15098d5

  • SHA1

    6da94de9b802091686dc640c951205c50ce53182

  • SHA256

    48dc546fd72839ba913d8df996713bf6f4026da395321e85d7a389ee632d4642

  • SHA512

    05c0cc99d82ffeca0366d38c34bc942a184a90d163f165fc0f9801997500305514028af051043fe368a5ea72a6311bd801e96a4a6be785ff51f4f414f7608db6

Malware Config

Targets

    • Target

      48dc546fd72839ba913d8df996713bf6f4026da395321e85d7a389ee632d4642

    • Size

      1.2MB

    • MD5

      7646f5ed5e19b61c8a94005ad15098d5

    • SHA1

      6da94de9b802091686dc640c951205c50ce53182

    • SHA256

      48dc546fd72839ba913d8df996713bf6f4026da395321e85d7a389ee632d4642

    • SHA512

      05c0cc99d82ffeca0366d38c34bc942a184a90d163f165fc0f9801997500305514028af051043fe368a5ea72a6311bd801e96a4a6be785ff51f4f414f7608db6

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks