General

  • Target

    9b2a6a5b076828f7f0a821e254c49bf74abed0b9974f3fe6f74414210e71ac8c

  • Size

    936KB

  • Sample

    241011-tn9rva1dpc

  • MD5

    8eef978c00b27044f919df7c554d5520

  • SHA1

    cebd31232222956453ec07290acf6acd42bf1ba7

  • SHA256

    9b2a6a5b076828f7f0a821e254c49bf74abed0b9974f3fe6f74414210e71ac8c

  • SHA512

    1be501d0c1770bc5cb35ef26afb8d7670983888b2d7ce9ab26b3cbbd9d9d582437111ec43b060d6b378df3af9888501e81f03b5506d13e775ae2172d3d84bd41

  • SSDEEP

    12288:bPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8y1:btKTrsKSKBTSb6DUXWq8y1

Malware Config

Targets

    • Target

      9b2a6a5b076828f7f0a821e254c49bf74abed0b9974f3fe6f74414210e71ac8c

    • Size

      936KB

    • MD5

      8eef978c00b27044f919df7c554d5520

    • SHA1

      cebd31232222956453ec07290acf6acd42bf1ba7

    • SHA256

      9b2a6a5b076828f7f0a821e254c49bf74abed0b9974f3fe6f74414210e71ac8c

    • SHA512

      1be501d0c1770bc5cb35ef26afb8d7670983888b2d7ce9ab26b3cbbd9d9d582437111ec43b060d6b378df3af9888501e81f03b5506d13e775ae2172d3d84bd41

    • SSDEEP

      12288:bPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8y1:btKTrsKSKBTSb6DUXWq8y1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks