General

  • Target

    75744da9a671242b908e36a14db2b512b454f506e6eee9e77da3bec1e7225f7d

  • Size

    664KB

  • Sample

    241018-dsgc4atfqa

  • MD5

    5f6c31f53f65a1fdb86734c3f9ee7840

  • SHA1

    a8c5aeb8b426258e84fb7b4bd181f85db18405ae

  • SHA256

    75744da9a671242b908e36a14db2b512b454f506e6eee9e77da3bec1e7225f7d

  • SHA512

    a1713364329e883b9a62409ce721ce7fbc929814e196c8eb18a3bf121cf2eea83d875869d1c8702ef7f9888e4f11659201132554d0101ecf6d0d89592025d242

  • SSDEEP

    6144:y34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTg:yIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      75744da9a671242b908e36a14db2b512b454f506e6eee9e77da3bec1e7225f7d

    • Size

      664KB

    • MD5

      5f6c31f53f65a1fdb86734c3f9ee7840

    • SHA1

      a8c5aeb8b426258e84fb7b4bd181f85db18405ae

    • SHA256

      75744da9a671242b908e36a14db2b512b454f506e6eee9e77da3bec1e7225f7d

    • SHA512

      a1713364329e883b9a62409ce721ce7fbc929814e196c8eb18a3bf121cf2eea83d875869d1c8702ef7f9888e4f11659201132554d0101ecf6d0d89592025d242

    • SSDEEP

      6144:y34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTg:yIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks