General

  • Target

    2e0188862974438b82ac36ba48da6ff36884ac60fb4d4d95dee475dec5785c3e

  • Size

    664KB

  • Sample

    241028-31788ayje1

  • MD5

    85ba6340c836fdcd7efc7fbc78d60817

  • SHA1

    53e49b348a3ff1db4a5b59f34165f3ca6c1cbe4f

  • SHA256

    2e0188862974438b82ac36ba48da6ff36884ac60fb4d4d95dee475dec5785c3e

  • SHA512

    c4249b7c390a382aeddc94c1b3e3f445517c2c5962ae8d1bebc837f30e2b2a9997c758c4f892be4c55eea757c31e4ba58baf9d336dda8b74ef2de8f263ca3a67

  • SSDEEP

    6144:P34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:PIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      2e0188862974438b82ac36ba48da6ff36884ac60fb4d4d95dee475dec5785c3e

    • Size

      664KB

    • MD5

      85ba6340c836fdcd7efc7fbc78d60817

    • SHA1

      53e49b348a3ff1db4a5b59f34165f3ca6c1cbe4f

    • SHA256

      2e0188862974438b82ac36ba48da6ff36884ac60fb4d4d95dee475dec5785c3e

    • SHA512

      c4249b7c390a382aeddc94c1b3e3f445517c2c5962ae8d1bebc837f30e2b2a9997c758c4f892be4c55eea757c31e4ba58baf9d336dda8b74ef2de8f263ca3a67

    • SSDEEP

      6144:P34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:PIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks