General

  • Target

    a61afcc952dbc670a70569043015ae03ae3704ae4c6023bf85e2df86ec4c7763

  • Size

    668KB

  • Sample

    241029-wsjgkaxhlj

  • MD5

    f1fef96e70f11bcc6f67cb15fa1d2220

  • SHA1

    981d5a3fe6ed1b02bdd9dee4daf3d4777b17dbb2

  • SHA256

    a61afcc952dbc670a70569043015ae03ae3704ae4c6023bf85e2df86ec4c7763

  • SHA512

    34e7dcb270ab5cd8838c5fd036fe2fd060619f18ff33a1803e5aac3a5fedb198642ab051f8d63a9410ed8864e0ea2c2cb1c0fb968f9abed72e2cb954d1fb5258

  • SSDEEP

    6144:+34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:+IKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      a61afcc952dbc670a70569043015ae03ae3704ae4c6023bf85e2df86ec4c7763

    • Size

      668KB

    • MD5

      f1fef96e70f11bcc6f67cb15fa1d2220

    • SHA1

      981d5a3fe6ed1b02bdd9dee4daf3d4777b17dbb2

    • SHA256

      a61afcc952dbc670a70569043015ae03ae3704ae4c6023bf85e2df86ec4c7763

    • SHA512

      34e7dcb270ab5cd8838c5fd036fe2fd060619f18ff33a1803e5aac3a5fedb198642ab051f8d63a9410ed8864e0ea2c2cb1c0fb968f9abed72e2cb954d1fb5258

    • SSDEEP

      6144:+34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:+IKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks