General

  • Target

    4e316e27c53cdbe1c45f5dc77bdd077ec55a9c0b399dc0680f8d73e5f579b745

  • Size

    668KB

  • Sample

    241029-wsetdaxhkp

  • MD5

    1b93b4a0fc966e6a9bc34b5930c0177d

  • SHA1

    b646f6d379fcbec61abc34461c7a5b886d317e1f

  • SHA256

    4e316e27c53cdbe1c45f5dc77bdd077ec55a9c0b399dc0680f8d73e5f579b745

  • SHA512

    92a77bb261507efeb6c37254d0f94ce902e10587c0b13c336640ffc445ea2e31c9f80dbe32cfcd7ff6eb04fc844c0bc05c9725f7dc6cd70d1e3b7e53b62f9f2f

  • SSDEEP

    6144:W34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:WIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      4e316e27c53cdbe1c45f5dc77bdd077ec55a9c0b399dc0680f8d73e5f579b745

    • Size

      668KB

    • MD5

      1b93b4a0fc966e6a9bc34b5930c0177d

    • SHA1

      b646f6d379fcbec61abc34461c7a5b886d317e1f

    • SHA256

      4e316e27c53cdbe1c45f5dc77bdd077ec55a9c0b399dc0680f8d73e5f579b745

    • SHA512

      92a77bb261507efeb6c37254d0f94ce902e10587c0b13c336640ffc445ea2e31c9f80dbe32cfcd7ff6eb04fc844c0bc05c9725f7dc6cd70d1e3b7e53b62f9f2f

    • SSDEEP

      6144:W34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:WIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks