General

  • Target

    7b5abbc20d881379a184b6c2f29a1e70196b4dabdbfbebc60f439a83be323bb4

  • Size

    668KB

  • Sample

    241018-evpypawgqg

  • MD5

    95c5f4396d2f989fa54fd09521fc2676

  • SHA1

    7bf1a0ee837c77866dd7ea42eb0ddf060990fd81

  • SHA256

    7b5abbc20d881379a184b6c2f29a1e70196b4dabdbfbebc60f439a83be323bb4

  • SHA512

    1ce9ef6f4f5cc2d4ce245b0efc330d7e62dd0e4a8ad57570f25efb67364bb6ca5888ad9dcc1a41ee95d682aa0b4633971c6d83428cf307fa6ea6fd0692dc7494

  • SSDEEP

    6144:v34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:vIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      7b5abbc20d881379a184b6c2f29a1e70196b4dabdbfbebc60f439a83be323bb4

    • Size

      668KB

    • MD5

      95c5f4396d2f989fa54fd09521fc2676

    • SHA1

      7bf1a0ee837c77866dd7ea42eb0ddf060990fd81

    • SHA256

      7b5abbc20d881379a184b6c2f29a1e70196b4dabdbfbebc60f439a83be323bb4

    • SHA512

      1ce9ef6f4f5cc2d4ce245b0efc330d7e62dd0e4a8ad57570f25efb67364bb6ca5888ad9dcc1a41ee95d682aa0b4633971c6d83428cf307fa6ea6fd0692dc7494

    • SSDEEP

      6144:v34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:vIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks