General

  • Target

    b996bd4a19e143f16d6497f87abf72874f0afba80cf5374d24b0a3522556b082

  • Size

    1.4MB

  • Sample

    241030-wbhtpsxlfz

  • MD5

    ae929a0749157b4e066875db351711ef

  • SHA1

    8aa55d7d9b43225ce5f67b31332f56c35459520d

  • SHA256

    b996bd4a19e143f16d6497f87abf72874f0afba80cf5374d24b0a3522556b082

  • SHA512

    3b5b6c85574e6bb6620cfc78c07b18101df0ef2e4e9d8f8f1affa83c0b8cfc4557a86338bed9467ddabcb6c7b98ebfd972cd1d0031ae927436629fabb8e39c34

  • SSDEEP

    12288:nkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:nkMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Targets

    • Target

      b996bd4a19e143f16d6497f87abf72874f0afba80cf5374d24b0a3522556b082

    • Size

      1.4MB

    • MD5

      ae929a0749157b4e066875db351711ef

    • SHA1

      8aa55d7d9b43225ce5f67b31332f56c35459520d

    • SHA256

      b996bd4a19e143f16d6497f87abf72874f0afba80cf5374d24b0a3522556b082

    • SHA512

      3b5b6c85574e6bb6620cfc78c07b18101df0ef2e4e9d8f8f1affa83c0b8cfc4557a86338bed9467ddabcb6c7b98ebfd972cd1d0031ae927436629fabb8e39c34

    • SSDEEP

      12288:nkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:nkMZ+gf4ltGd8H1fYO0q2G1Ah

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks