General

  • Target

    db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a

  • Size

    1.4MB

  • Sample

    241030-3m4nwatenc

  • MD5

    e74399f942cf0cf81df1e8a4972bb8bb

  • SHA1

    13416b3359fb3b1ce03acca069454bb4c228b3f0

  • SHA256

    db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a

  • SHA512

    09968cb2afead5f2626ed4c85471ffa0b80fab89066e4662dd07f86824a9873f149fa840950123989fe9fdee44649de6f52a7975da6d57ff29094ddfb4b459d0

  • SSDEEP

    12288:DkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64Cw1:DkMZ+gf4ltGd8H1fYO0q2G1Ahw1

Malware Config

Targets

    • Target

      db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a

    • Size

      1.4MB

    • MD5

      e74399f942cf0cf81df1e8a4972bb8bb

    • SHA1

      13416b3359fb3b1ce03acca069454bb4c228b3f0

    • SHA256

      db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a

    • SHA512

      09968cb2afead5f2626ed4c85471ffa0b80fab89066e4662dd07f86824a9873f149fa840950123989fe9fdee44649de6f52a7975da6d57ff29094ddfb4b459d0

    • SSDEEP

      12288:DkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64Cw1:DkMZ+gf4ltGd8H1fYO0q2G1Ahw1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks