General

  • Target

    2c7566a218824ff9c74582e59b3ee42f1c5c780ebb721b145e05baf2b36e499e

  • Size

    1.1MB

  • Sample

    241012-rp618svdqa

  • MD5

    41f473abe15c43835fe74461cbe40ee7

  • SHA1

    e15b1de311c779e53e83c87f743eb710d660aa91

  • SHA256

    2c7566a218824ff9c74582e59b3ee42f1c5c780ebb721b145e05baf2b36e499e

  • SHA512

    7dab20ca04e4e3e517c255961c8ac301664e8e9b48e9ab0d2f012b161a2a88422d597c8a9ff082d4d50d58c2c57c1c340390720539f8188e845d92b5e0e7ec70

  • SSDEEP

    12288:4kMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:4kMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Targets

    • Target

      2c7566a218824ff9c74582e59b3ee42f1c5c780ebb721b145e05baf2b36e499e

    • Size

      1.1MB

    • MD5

      41f473abe15c43835fe74461cbe40ee7

    • SHA1

      e15b1de311c779e53e83c87f743eb710d660aa91

    • SHA256

      2c7566a218824ff9c74582e59b3ee42f1c5c780ebb721b145e05baf2b36e499e

    • SHA512

      7dab20ca04e4e3e517c255961c8ac301664e8e9b48e9ab0d2f012b161a2a88422d597c8a9ff082d4d50d58c2c57c1c340390720539f8188e845d92b5e0e7ec70

    • SSDEEP

      12288:4kMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:4kMZ+gf4ltGd8H1fYO0q2G1Ah

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks