General

  • Target

    97b25d2ee63b52b28c0a7f77f87b4163e106f28f831b765099c641297be1d121

  • Size

    676KB

  • Sample

    241114-vexllavmbj

  • MD5

    a419f6c38aab1882f8e8971dc1f52e13

  • SHA1

    2e28d486ce97a07d3c3a4bf0e1ee7882d2739b42

  • SHA256

    97b25d2ee63b52b28c0a7f77f87b4163e106f28f831b765099c641297be1d121

  • SHA512

    7fd998afc56ff1e09cc2109fb0198f7727378ea07b35162970f900ea49b17825772e1e2492ce4788d1bae7769e11fc6b0273d7db8be6908c88e162457e23ac94

  • SSDEEP

    6144:M34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:MIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      97b25d2ee63b52b28c0a7f77f87b4163e106f28f831b765099c641297be1d121

    • Size

      676KB

    • MD5

      a419f6c38aab1882f8e8971dc1f52e13

    • SHA1

      2e28d486ce97a07d3c3a4bf0e1ee7882d2739b42

    • SHA256

      97b25d2ee63b52b28c0a7f77f87b4163e106f28f831b765099c641297be1d121

    • SHA512

      7fd998afc56ff1e09cc2109fb0198f7727378ea07b35162970f900ea49b17825772e1e2492ce4788d1bae7769e11fc6b0273d7db8be6908c88e162457e23ac94

    • SSDEEP

      6144:M34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:MIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks