General

  • Target

    c749a6d6524352a22d0f2233ce60383865b387a689d3630e2f574249dda35a5d

  • Size

    676KB

  • Sample

    241114-vgq7la1gjq

  • MD5

    c28e410fb7df7dca23a4c47feace68e7

  • SHA1

    98cce2e4073e23dbdb4af2535566b5cc8e889158

  • SHA256

    c749a6d6524352a22d0f2233ce60383865b387a689d3630e2f574249dda35a5d

  • SHA512

    0c73a663199187ef8a587c62ec5082ad843cefb9160cdb2ab4dd5bbeba0e0ee951da8cc5897b903510fc2efde3fd9743a03e5580c9b6a5efab76e8b60c455eae

  • SSDEEP

    6144:z34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:zIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      c749a6d6524352a22d0f2233ce60383865b387a689d3630e2f574249dda35a5d

    • Size

      676KB

    • MD5

      c28e410fb7df7dca23a4c47feace68e7

    • SHA1

      98cce2e4073e23dbdb4af2535566b5cc8e889158

    • SHA256

      c749a6d6524352a22d0f2233ce60383865b387a689d3630e2f574249dda35a5d

    • SHA512

      0c73a663199187ef8a587c62ec5082ad843cefb9160cdb2ab4dd5bbeba0e0ee951da8cc5897b903510fc2efde3fd9743a03e5580c9b6a5efab76e8b60c455eae

    • SSDEEP

      6144:z34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:zIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks