General

  • Target

    41614fc30de6ea778c6fa12e9ed5cb389679580e3903a40b3373d92b103eb010

  • Size

    948KB

  • Sample

    241018-fsgpzasaql

  • MD5

    80f06337c927418ef2dbe6efa147d64a

  • SHA1

    4a016b8fe8c023f840f18d3b40f6e6f44fb9d6f2

  • SHA256

    41614fc30de6ea778c6fa12e9ed5cb389679580e3903a40b3373d92b103eb010

  • SHA512

    0abe2424cdd1f23f60dea1a920aa930805f805a913c6d4916986329874fa1e4c6b5e22dc39123191c903460f21786b6e828447dc1bfbaa65576d11a479db18b5

  • SSDEEP

    6144:P34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:PIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      41614fc30de6ea778c6fa12e9ed5cb389679580e3903a40b3373d92b103eb010

    • Size

      948KB

    • MD5

      80f06337c927418ef2dbe6efa147d64a

    • SHA1

      4a016b8fe8c023f840f18d3b40f6e6f44fb9d6f2

    • SHA256

      41614fc30de6ea778c6fa12e9ed5cb389679580e3903a40b3373d92b103eb010

    • SHA512

      0abe2424cdd1f23f60dea1a920aa930805f805a913c6d4916986329874fa1e4c6b5e22dc39123191c903460f21786b6e828447dc1bfbaa65576d11a479db18b5

    • SSDEEP

      6144:P34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:PIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks