General

  • Target

    4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a

  • Size

    1.1MB

  • Sample

    241012-m91mqsxdna

  • MD5

    47256612c3c8c8f506e0755af28551e8

  • SHA1

    c72c90635b24feadcd786fef8cfe756eaa14b4cb

  • SHA256

    4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a

  • SHA512

    c84b91c039127bf34c2bf3996fe5c044dbd34ca248f8117966d4a43582f4e87578b471675278a6f46ba20fe58856144c8498d435e4df15075a087a81815e0075

  • SSDEEP

    12288:IkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:IkMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Targets

    • Target

      4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a

    • Size

      1.1MB

    • MD5

      47256612c3c8c8f506e0755af28551e8

    • SHA1

      c72c90635b24feadcd786fef8cfe756eaa14b4cb

    • SHA256

      4aa9b7b5b577b6596e284ef74944718f3e790cbdda9f8fc30c065a545dab628a

    • SHA512

      c84b91c039127bf34c2bf3996fe5c044dbd34ca248f8117966d4a43582f4e87578b471675278a6f46ba20fe58856144c8498d435e4df15075a087a81815e0075

    • SSDEEP

      12288:IkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:IkMZ+gf4ltGd8H1fYO0q2G1Ah

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks