General

  • Target

    6562aa0b5ce1d60fdd3356b1814d1990da8c53e063b49b873b54184c6cac8e3a

  • Size

    972KB

  • Sample

    220419-exsglabgak

  • MD5

    c13dbdfb58da48769cfe6bc96bd0403f

  • SHA1

    caea0f4ffb19467c3dbe94b2f677bf851f690c00

  • SHA256

    6562aa0b5ce1d60fdd3356b1814d1990da8c53e063b49b873b54184c6cac8e3a

  • SHA512

    0d829f832d5797c429defd3d67585e8d83aae588ecb1dfdd3fb864ec43bcf4a990a79492af329bdaff99c4382b11fd501a0dfc64e520d8239f22c0bb53b0c96b

Malware Config

Targets

    • Target

      6562aa0b5ce1d60fdd3356b1814d1990da8c53e063b49b873b54184c6cac8e3a

    • Size

      972KB

    • MD5

      c13dbdfb58da48769cfe6bc96bd0403f

    • SHA1

      caea0f4ffb19467c3dbe94b2f677bf851f690c00

    • SHA256

      6562aa0b5ce1d60fdd3356b1814d1990da8c53e063b49b873b54184c6cac8e3a

    • SHA512

      0d829f832d5797c429defd3d67585e8d83aae588ecb1dfdd3fb864ec43bcf4a990a79492af329bdaff99c4382b11fd501a0dfc64e520d8239f22c0bb53b0c96b

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks