General

  • Target

    c993b31ce40179bd8997e6a298875c02744cc7d07225dad945a88d7ac755515f

  • Size

    940KB

  • Sample

    240913-cn82waycjr

  • MD5

    eac9db11159f94acffc10b94097debea

  • SHA1

    c2b90ec31a8ba440f14131e5598cecdc65db300a

  • SHA256

    c993b31ce40179bd8997e6a298875c02744cc7d07225dad945a88d7ac755515f

  • SHA512

    4c33638e34a9dcd5f05dab7f212c3dd8c0f293f5f61eb582420171712b27474fa043f1649a6e35c07f1c32afeb981027d14c6fae1361d788c29bb5144e109911

  • SSDEEP

    12288:H0YTYL6Mqi7W8xto9OpWswk1GNup1XhBmsUqOZEYUANgBomHGe0zcPTP3E:H0CYZWgtWkEuHXhBmLHeuWBomaiP

Malware Config

Targets

    • Target

      c993b31ce40179bd8997e6a298875c02744cc7d07225dad945a88d7ac755515f

    • Size

      940KB

    • MD5

      eac9db11159f94acffc10b94097debea

    • SHA1

      c2b90ec31a8ba440f14131e5598cecdc65db300a

    • SHA256

      c993b31ce40179bd8997e6a298875c02744cc7d07225dad945a88d7ac755515f

    • SHA512

      4c33638e34a9dcd5f05dab7f212c3dd8c0f293f5f61eb582420171712b27474fa043f1649a6e35c07f1c32afeb981027d14c6fae1361d788c29bb5144e109911

    • SSDEEP

      12288:H0YTYL6Mqi7W8xto9OpWswk1GNup1XhBmsUqOZEYUANgBomHGe0zcPTP3E:H0CYZWgtWkEuHXhBmLHeuWBomaiP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks