General

  • Target

    f9244033cd6a59c0de137c0211e98b0adef2afc54a56cae909aad14bdfe62e55

  • Size

    672KB

  • Sample

    241029-wk3v8synfr

  • MD5

    63e9a975848446456adbf6d5a552286f

  • SHA1

    0d51906d785e8c0388f98c298edeb8a3a68c4294

  • SHA256

    f9244033cd6a59c0de137c0211e98b0adef2afc54a56cae909aad14bdfe62e55

  • SHA512

    958abf84bcd4b357feaf51a6d4655a13574aa808de22d6d753bc552f64bbfdbba38a65eec2a8e8d2680fd7e5bfd5c2267e5b74a27ae0b3927860ef3f47b264ba

  • SSDEEP

    6144:O34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:OIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      f9244033cd6a59c0de137c0211e98b0adef2afc54a56cae909aad14bdfe62e55

    • Size

      672KB

    • MD5

      63e9a975848446456adbf6d5a552286f

    • SHA1

      0d51906d785e8c0388f98c298edeb8a3a68c4294

    • SHA256

      f9244033cd6a59c0de137c0211e98b0adef2afc54a56cae909aad14bdfe62e55

    • SHA512

      958abf84bcd4b357feaf51a6d4655a13574aa808de22d6d753bc552f64bbfdbba38a65eec2a8e8d2680fd7e5bfd5c2267e5b74a27ae0b3927860ef3f47b264ba

    • SSDEEP

      6144:O34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:OIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks