General

  • Target

    0578ca26240da4f6d730aa7e4fe4f6f26c3a8abc83fb23383dfbd989c9d1e81f

  • Size

    1.1MB

  • Sample

    220419-eycsjabgfm

  • MD5

    7a4b0440d9c0b2710c81eeb5ac97b351

  • SHA1

    444cc6864cc9f95d37d89b141604c2edda758ca9

  • SHA256

    0578ca26240da4f6d730aa7e4fe4f6f26c3a8abc83fb23383dfbd989c9d1e81f

  • SHA512

    fd1b4d977b3316543279b53ea705c1b04d625058c8a3961b59fe980a0008d2bdeadaa014a45bb915eda4eeab96bd9821acf4e4bd2a1a0b52398dc37407696dc0

Malware Config

Targets

    • Target

      0578ca26240da4f6d730aa7e4fe4f6f26c3a8abc83fb23383dfbd989c9d1e81f

    • Size

      1.1MB

    • MD5

      7a4b0440d9c0b2710c81eeb5ac97b351

    • SHA1

      444cc6864cc9f95d37d89b141604c2edda758ca9

    • SHA256

      0578ca26240da4f6d730aa7e4fe4f6f26c3a8abc83fb23383dfbd989c9d1e81f

    • SHA512

      fd1b4d977b3316543279b53ea705c1b04d625058c8a3961b59fe980a0008d2bdeadaa014a45bb915eda4eeab96bd9821acf4e4bd2a1a0b52398dc37407696dc0

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Modifies Installed Components in the registry

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

Tasks