General

  • Target

    db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c

  • Size

    800KB

  • Sample

    240717-hlde3szcqm

  • MD5

    844f37f59e5af38fca800fb75c94a4b9

  • SHA1

    8505caf8264a9a1cdd9a6f6cba608ef01e38a2d9

  • SHA256

    db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c

  • SHA512

    7c3130224a823be7271e9489497c979bae68836c3779f0028325a245ff2138ef21870c4d84fb1d7f8943a1bc1f497a2d63d95aeb8bb6a6893ad00fc4d4f55b7d

  • SSDEEP

    12288:hBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:j/nts0Q9K/0ooRQIxAk2wi0N/

Malware Config

Targets

    • Target

      db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c

    • Size

      800KB

    • MD5

      844f37f59e5af38fca800fb75c94a4b9

    • SHA1

      8505caf8264a9a1cdd9a6f6cba608ef01e38a2d9

    • SHA256

      db9c18d05fd830f2f9e7cc0b5011f44a80277b3e298cee715587e8607542b49c

    • SHA512

      7c3130224a823be7271e9489497c979bae68836c3779f0028325a245ff2138ef21870c4d84fb1d7f8943a1bc1f497a2d63d95aeb8bb6a6893ad00fc4d4f55b7d

    • SSDEEP

      12288:hBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:j/nts0Q9K/0ooRQIxAk2wi0N/

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks