General

  • Target

    a207eff9085223b41efa50e8c5212159b2f546e2ca348cbecb014a29460b3cbd

  • Size

    848KB

  • Sample

    240414-ae8cwabg39

  • MD5

    981cdedd76e4b8ca77fd40a4caf72463

  • SHA1

    10570f977b5af392293fbc3f9d7174ada4f5ad20

  • SHA256

    a207eff9085223b41efa50e8c5212159b2f546e2ca348cbecb014a29460b3cbd

  • SHA512

    2ee0cc26858ca7ef05c6ce087a404875d8199b0c8454ea22cad301d9aad6e7bc9cc1e3996538cb5ce731ae7541cc4c7efa781342bf79567e1210626957881dc9

  • SSDEEP

    12288:rZgJtlQepQn+NDo7nIgegQCLDF/B9wvj/cLvVZFuw:rZK6F7nVeRmDFJivohZFV

Malware Config

Targets

    • Target

      a207eff9085223b41efa50e8c5212159b2f546e2ca348cbecb014a29460b3cbd

    • Size

      848KB

    • MD5

      981cdedd76e4b8ca77fd40a4caf72463

    • SHA1

      10570f977b5af392293fbc3f9d7174ada4f5ad20

    • SHA256

      a207eff9085223b41efa50e8c5212159b2f546e2ca348cbecb014a29460b3cbd

    • SHA512

      2ee0cc26858ca7ef05c6ce087a404875d8199b0c8454ea22cad301d9aad6e7bc9cc1e3996538cb5ce731ae7541cc4c7efa781342bf79567e1210626957881dc9

    • SSDEEP

      12288:rZgJtlQepQn+NDo7nIgegQCLDF/B9wvj/cLvVZFuw:rZK6F7nVeRmDFJivohZFV

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks