General

  • Target

    349a48524a21cc6f8d8aed8caaa9fa006a558a7551506d831a29ce61ae7ee088

  • Size

    952KB

  • Sample

    241018-h4ljeaxalq

  • MD5

    e9caaf99ddd15f21e80be6ad6ba0061a

  • SHA1

    216eebcaf321981fb3d87b6c49baa53e35ce405e

  • SHA256

    349a48524a21cc6f8d8aed8caaa9fa006a558a7551506d831a29ce61ae7ee088

  • SHA512

    cbe0c6597f954722d2d85e599c55a96334d7c650beb9df375e7a1fb55eb92d1697611ec33d536645c41b856d392c9e5f0a0a4296180bae03ea2376514666d5e7

  • SSDEEP

    6144:x34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:xIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      349a48524a21cc6f8d8aed8caaa9fa006a558a7551506d831a29ce61ae7ee088

    • Size

      952KB

    • MD5

      e9caaf99ddd15f21e80be6ad6ba0061a

    • SHA1

      216eebcaf321981fb3d87b6c49baa53e35ce405e

    • SHA256

      349a48524a21cc6f8d8aed8caaa9fa006a558a7551506d831a29ce61ae7ee088

    • SHA512

      cbe0c6597f954722d2d85e599c55a96334d7c650beb9df375e7a1fb55eb92d1697611ec33d536645c41b856d392c9e5f0a0a4296180bae03ea2376514666d5e7

    • SSDEEP

      6144:x34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:xIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks