General

  • Target

    e01422a81dacdf1eabb4333ea5ccb6c6a05e0b348d1d6ec3413e913b241b0b06

  • Size

    680KB

  • Sample

    241114-vjm8qavmdp

  • MD5

    fc8daedac7904d67fd8451f2bf2ecf56

  • SHA1

    4488ddc2b05aa4b38a41362bacbb9b27f427ad17

  • SHA256

    e01422a81dacdf1eabb4333ea5ccb6c6a05e0b348d1d6ec3413e913b241b0b06

  • SHA512

    09a54f82a9ad5a98589cdddb4dc4d2ac8a24d6443e28f89ea6bc0e5fc1859c51c9b688faaaa8a17c09b837ee0fc3769344ffd6ddfcd9af6edc1c5e867179fc73

  • SSDEEP

    6144:u34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:uIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      e01422a81dacdf1eabb4333ea5ccb6c6a05e0b348d1d6ec3413e913b241b0b06

    • Size

      680KB

    • MD5

      fc8daedac7904d67fd8451f2bf2ecf56

    • SHA1

      4488ddc2b05aa4b38a41362bacbb9b27f427ad17

    • SHA256

      e01422a81dacdf1eabb4333ea5ccb6c6a05e0b348d1d6ec3413e913b241b0b06

    • SHA512

      09a54f82a9ad5a98589cdddb4dc4d2ac8a24d6443e28f89ea6bc0e5fc1859c51c9b688faaaa8a17c09b837ee0fc3769344ffd6ddfcd9af6edc1c5e867179fc73

    • SSDEEP

      6144:u34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:uIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks