General
-
Target
c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756
-
Size
664KB
-
Sample
241029-wsztjswqdy
-
MD5
72dbe7ff8cb3b1c782692f3cc9615602
-
SHA1
7b97c3abc1e53da0d174f5f49bac65b2e005f13b
-
SHA256
c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756
-
SHA512
cb5f4ef030942e8136626b9a225ef2b2d243dad900b2b196289335c592c537d5289382d25491c3e89bd0546a126ebdda8b6c0eee7dacd713ae155f62e8b0ea72
-
SSDEEP
6144:P34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:PIKp/UWCZdCDh2IZDwAFRpR6Au
Static task
static1
Behavioral task
behavioral1
Sample
c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756
-
Size
664KB
-
MD5
72dbe7ff8cb3b1c782692f3cc9615602
-
SHA1
7b97c3abc1e53da0d174f5f49bac65b2e005f13b
-
SHA256
c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756
-
SHA512
cb5f4ef030942e8136626b9a225ef2b2d243dad900b2b196289335c592c537d5289382d25491c3e89bd0546a126ebdda8b6c0eee7dacd713ae155f62e8b0ea72
-
SSDEEP
6144:P34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:PIKp/UWCZdCDh2IZDwAFRpR6Au
-
Dridex family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1