General

  • Target

    f5d660b977e22b4d550dca849e073ac6c0378b3158672b954a5a78c63a4ee6e8

  • Size

    677KB

  • Sample

    241026-fs7amazgka

  • MD5

    155d603dd9fd58ebe24a854d6597e345

  • SHA1

    3c43fdaa5916faf0aa144f918e71620b66b4c3d3

  • SHA256

    f5d660b977e22b4d550dca849e073ac6c0378b3158672b954a5a78c63a4ee6e8

  • SHA512

    e0b43c7a69318b198b63e821bf0543bfbb4e414c8084ee1b6b3aa4bbd0f3c8ee52723ab0496308bbba8411b2ac361c42b3c110c95165367e187b25e94f1148e3

  • SSDEEP

    12288:bMotqoDpGg+O0HCmTkLK+qIRl+lC0fVtN86WCjt:IotMg+OsCoiK+9l+lhTTWC

Malware Config

Targets

    • Target

      f5d660b977e22b4d550dca849e073ac6c0378b3158672b954a5a78c63a4ee6e8

    • Size

      677KB

    • MD5

      155d603dd9fd58ebe24a854d6597e345

    • SHA1

      3c43fdaa5916faf0aa144f918e71620b66b4c3d3

    • SHA256

      f5d660b977e22b4d550dca849e073ac6c0378b3158672b954a5a78c63a4ee6e8

    • SHA512

      e0b43c7a69318b198b63e821bf0543bfbb4e414c8084ee1b6b3aa4bbd0f3c8ee52723ab0496308bbba8411b2ac361c42b3c110c95165367e187b25e94f1148e3

    • SSDEEP

      12288:bMotqoDpGg+O0HCmTkLK+qIRl+lC0fVtN86WCjt:IotMg+OsCoiK+9l+lhTTWC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks