General

  • Target

    d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727

  • Size

    664KB

  • Sample

    241018-fsgpzayfle

  • MD5

    192f752bbdcb5e33312abe8fd40eb318

  • SHA1

    efaccfee37c0fa32a1b45b156ad4e65a33bab91e

  • SHA256

    d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727

  • SHA512

    0ed59a18735e566cc458b3c3dd27d07fa62d1ec55f67ea3e9f8779ac0ce7373da046ed4dc7b4420d33ec6e810b317f56317b8ba4861825221a2b4ed54cfc9f0e

  • SSDEEP

    6144:W34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:WIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727

    • Size

      664KB

    • MD5

      192f752bbdcb5e33312abe8fd40eb318

    • SHA1

      efaccfee37c0fa32a1b45b156ad4e65a33bab91e

    • SHA256

      d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727

    • SHA512

      0ed59a18735e566cc458b3c3dd27d07fa62d1ec55f67ea3e9f8779ac0ce7373da046ed4dc7b4420d33ec6e810b317f56317b8ba4861825221a2b4ed54cfc9f0e

    • SSDEEP

      6144:W34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:WIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks