General

  • Target

    f4017ed8c6e7b257a1f29b097c2fe59c4ce43f125669d3e59cf7b71fffb17f2d

  • Size

    744KB

  • Sample

    240310-wjtk6shg7w

  • MD5

    429bcf175240eb2fdacab6c22ec4a193

  • SHA1

    e338ba52d314cc6f9da3fc6027c5d4ef1daffb82

  • SHA256

    f4017ed8c6e7b257a1f29b097c2fe59c4ce43f125669d3e59cf7b71fffb17f2d

  • SHA512

    73ed0569cfa2757bff65a83c4baa482ca6916407251397e0babac76b224314028f77e6c4149dfa2a9b822b1f0ca82948385161b4e20d310da9a44cc4f60aa41c

  • SSDEEP

    12288:JBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:r/nts0Q9K/0ooRQIxAk2wi0N/

Malware Config

Targets

    • Target

      f4017ed8c6e7b257a1f29b097c2fe59c4ce43f125669d3e59cf7b71fffb17f2d

    • Size

      744KB

    • MD5

      429bcf175240eb2fdacab6c22ec4a193

    • SHA1

      e338ba52d314cc6f9da3fc6027c5d4ef1daffb82

    • SHA256

      f4017ed8c6e7b257a1f29b097c2fe59c4ce43f125669d3e59cf7b71fffb17f2d

    • SHA512

      73ed0569cfa2757bff65a83c4baa482ca6916407251397e0babac76b224314028f77e6c4149dfa2a9b822b1f0ca82948385161b4e20d310da9a44cc4f60aa41c

    • SSDEEP

      12288:JBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:r/nts0Q9K/0ooRQIxAk2wi0N/

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks