General

  • Target

    79ce64fe463d8dc2c3687245f24393b3690e5279ca0510483ef154ac3c8b45cf

  • Size

    968KB

  • Sample

    220419-exnhmsfcd2

  • MD5

    c8073ff4fbafcf44911cbcebb3bc9c1d

  • SHA1

    f9d3c9b951b65a799cb4274c0caeed80d6ac522e

  • SHA256

    79ce64fe463d8dc2c3687245f24393b3690e5279ca0510483ef154ac3c8b45cf

  • SHA512

    a8144a46b3fc3fba6f05ca8be4d1bf275d4dca8ee0a6d17a64300a8dc81ca016179b73ad80822530c84a2b513af244738f27ea8456881cd3e472148b1e25d74a

Malware Config

Targets

    • Target

      79ce64fe463d8dc2c3687245f24393b3690e5279ca0510483ef154ac3c8b45cf

    • Size

      968KB

    • MD5

      c8073ff4fbafcf44911cbcebb3bc9c1d

    • SHA1

      f9d3c9b951b65a799cb4274c0caeed80d6ac522e

    • SHA256

      79ce64fe463d8dc2c3687245f24393b3690e5279ca0510483ef154ac3c8b45cf

    • SHA512

      a8144a46b3fc3fba6f05ca8be4d1bf275d4dca8ee0a6d17a64300a8dc81ca016179b73ad80822530c84a2b513af244738f27ea8456881cd3e472148b1e25d74a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks