General

  • Target

    f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b

  • Size

    1.4MB

  • Sample

    241031-avg6mavemh

  • MD5

    16bb8e25d3d2f866cbf6826bb90fd325

  • SHA1

    ce86cea88918e556a9d0d2061c332da8e7513623

  • SHA256

    f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b

  • SHA512

    53321d6e37c9be3be9970ec3a69d84c049e022d071e47a03b922149b453493f531eb4f2afbaee0110d2ba4b87414c653015dd7f85d31fb41848063891b6bee72

  • SSDEEP

    12288:TkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:TkMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Targets

    • Target

      f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b

    • Size

      1.4MB

    • MD5

      16bb8e25d3d2f866cbf6826bb90fd325

    • SHA1

      ce86cea88918e556a9d0d2061c332da8e7513623

    • SHA256

      f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b

    • SHA512

      53321d6e37c9be3be9970ec3a69d84c049e022d071e47a03b922149b453493f531eb4f2afbaee0110d2ba4b87414c653015dd7f85d31fb41848063891b6bee72

    • SSDEEP

      12288:TkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:TkMZ+gf4ltGd8H1fYO0q2G1Ah

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks