General

  • Target

    8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086

  • Size

    944KB

  • Sample

    241018-ane3paxglp

  • MD5

    342cec4e287b2f1285f18c63c01fc5e4

  • SHA1

    ba8832830889724887ef7ee003f2a3eed503e4b7

  • SHA256

    8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086

  • SHA512

    517db6bf9b425716f80afac7f2e6d897c2fecf84adfad35cec156809bcfb634ce4700b17f7d3810b5e9b10bbd784665097d62afa1e81f625b8827ea5e81cdec2

  • SSDEEP

    6144:s34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTg:sIKp/UWCZdCDh2IZDwAFRpR6Auk6kK

Malware Config

Targets

    • Target

      8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086

    • Size

      944KB

    • MD5

      342cec4e287b2f1285f18c63c01fc5e4

    • SHA1

      ba8832830889724887ef7ee003f2a3eed503e4b7

    • SHA256

      8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086

    • SHA512

      517db6bf9b425716f80afac7f2e6d897c2fecf84adfad35cec156809bcfb634ce4700b17f7d3810b5e9b10bbd784665097d62afa1e81f625b8827ea5e81cdec2

    • SSDEEP

      6144:s34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTg:sIKp/UWCZdCDh2IZDwAFRpR6Auk6kK

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks