General

  • Target

    9dae682deb306e5c72d8beedc9eedf323b3521386e4aa10bb9b9d3f3094666fd

  • Size

    672KB

  • Sample

    241018-ckghfszhmf

  • MD5

    08fc9ca5c852d1e0868b059d591464a9

  • SHA1

    9735f7c6a437b5d19a9650aedb20210bae91fccf

  • SHA256

    9dae682deb306e5c72d8beedc9eedf323b3521386e4aa10bb9b9d3f3094666fd

  • SHA512

    e353c859df21732c32a6a206ab1be26525df105da216c83c0d4679bb8a3e3f2190654df037232497a04d02699897850c136f47e5428897d9151c49e1ccd7f717

  • SSDEEP

    6144:Y34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:YIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      9dae682deb306e5c72d8beedc9eedf323b3521386e4aa10bb9b9d3f3094666fd

    • Size

      672KB

    • MD5

      08fc9ca5c852d1e0868b059d591464a9

    • SHA1

      9735f7c6a437b5d19a9650aedb20210bae91fccf

    • SHA256

      9dae682deb306e5c72d8beedc9eedf323b3521386e4aa10bb9b9d3f3094666fd

    • SHA512

      e353c859df21732c32a6a206ab1be26525df105da216c83c0d4679bb8a3e3f2190654df037232497a04d02699897850c136f47e5428897d9151c49e1ccd7f717

    • SSDEEP

      6144:Y34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:YIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks