General

  • Target

    a9e0ebbfc2fe45a06a23a56e34c6cf53596793df50c3ea6dcb102c4d6217a25d

  • Size

    973KB

  • Sample

    220419-excq5sfcb2

  • MD5

    cd4e22ed989116765ed8b43c91618a34

  • SHA1

    d43b1b30cb0efb06a7a0118a80ba2d05ed0fa4b2

  • SHA256

    a9e0ebbfc2fe45a06a23a56e34c6cf53596793df50c3ea6dcb102c4d6217a25d

  • SHA512

    e605fcce4ac7dba61111603b393501b12d4442668a465a758ecc38f9325b67b2998586d04063b6e2ea58d1cfe6461e97841b0b80eaffea842aba4c53215d36c7

Malware Config

Targets

    • Target

      a9e0ebbfc2fe45a06a23a56e34c6cf53596793df50c3ea6dcb102c4d6217a25d

    • Size

      973KB

    • MD5

      cd4e22ed989116765ed8b43c91618a34

    • SHA1

      d43b1b30cb0efb06a7a0118a80ba2d05ed0fa4b2

    • SHA256

      a9e0ebbfc2fe45a06a23a56e34c6cf53596793df50c3ea6dcb102c4d6217a25d

    • SHA512

      e605fcce4ac7dba61111603b393501b12d4442668a465a758ecc38f9325b67b2998586d04063b6e2ea58d1cfe6461e97841b0b80eaffea842aba4c53215d36c7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks