General

  • Target

    c8a9440be1df2b7f93e4e7aa7407ea1a99c50e41f27524845d175ca81e6d4f69

  • Size

    668KB

  • Sample

    241029-berkss1flf

  • MD5

    d5bde9d671851c1400307e33309c09a9

  • SHA1

    381365bd2fdd24f20173279728db8dde2331115e

  • SHA256

    c8a9440be1df2b7f93e4e7aa7407ea1a99c50e41f27524845d175ca81e6d4f69

  • SHA512

    334e82ab5397434cc861ead66aff1456898386ca864711fbbcb791d6e4133b78dbfed5fcb65e07f45d885fb394830262bbdc271e949ce7572c70311a35eb14c1

  • SSDEEP

    6144:m34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:mIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      c8a9440be1df2b7f93e4e7aa7407ea1a99c50e41f27524845d175ca81e6d4f69

    • Size

      668KB

    • MD5

      d5bde9d671851c1400307e33309c09a9

    • SHA1

      381365bd2fdd24f20173279728db8dde2331115e

    • SHA256

      c8a9440be1df2b7f93e4e7aa7407ea1a99c50e41f27524845d175ca81e6d4f69

    • SHA512

      334e82ab5397434cc861ead66aff1456898386ca864711fbbcb791d6e4133b78dbfed5fcb65e07f45d885fb394830262bbdc271e949ce7572c70311a35eb14c1

    • SSDEEP

      6144:m34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:mIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks