General

  • Target

    f3e5445bf8a1e7d8b66987427dc35f56c1f9e4b8510d5a57ca9639916a83bf6f

  • Size

    744KB

  • Sample

    240310-n6scmacc25

  • MD5

    6879c63919a9ad0dc300ee03dae01390

  • SHA1

    6216e83b03304b73ce6ab635bb1fd37b47eb112f

  • SHA256

    f3e5445bf8a1e7d8b66987427dc35f56c1f9e4b8510d5a57ca9639916a83bf6f

  • SHA512

    d8095a00c8f87f1a6345580dfff6bc34e02d61cbc481ee4f0f90649dbaa5d5e4f4c729cc2ec9f26dba6c0ded505c5e9046b325431de69ca8b38b8faf08257c88

  • SSDEEP

    12288:iBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:O/nts0Q9K/0ooRQIxAk2wi0N/

Malware Config

Targets

    • Target

      f3e5445bf8a1e7d8b66987427dc35f56c1f9e4b8510d5a57ca9639916a83bf6f

    • Size

      744KB

    • MD5

      6879c63919a9ad0dc300ee03dae01390

    • SHA1

      6216e83b03304b73ce6ab635bb1fd37b47eb112f

    • SHA256

      f3e5445bf8a1e7d8b66987427dc35f56c1f9e4b8510d5a57ca9639916a83bf6f

    • SHA512

      d8095a00c8f87f1a6345580dfff6bc34e02d61cbc481ee4f0f90649dbaa5d5e4f4c729cc2ec9f26dba6c0ded505c5e9046b325431de69ca8b38b8faf08257c88

    • SSDEEP

      12288:iBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:O/nts0Q9K/0ooRQIxAk2wi0N/

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks