General

  • Target

    db76e9aef5769f4d7d4ca37b2f0160a8729aacc8fafae46190d58b99b32b1dff

  • Size

    676KB

  • Sample

    241114-vlh2sa1glj

  • MD5

    9c45751dda6ab4ac264d1295ab158efa

  • SHA1

    59b727fd59931da358622c7992fc4b9f9d20e295

  • SHA256

    db76e9aef5769f4d7d4ca37b2f0160a8729aacc8fafae46190d58b99b32b1dff

  • SHA512

    155f17dbb814e0cf27c87c3c059a9e5c70f17f3888c8bf70a9775655409a504db84a455f50fa2de52bbec5b962f2a2b9f2ada52012933a05380128d3c36e0652

  • SSDEEP

    6144:q34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:qIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      db76e9aef5769f4d7d4ca37b2f0160a8729aacc8fafae46190d58b99b32b1dff

    • Size

      676KB

    • MD5

      9c45751dda6ab4ac264d1295ab158efa

    • SHA1

      59b727fd59931da358622c7992fc4b9f9d20e295

    • SHA256

      db76e9aef5769f4d7d4ca37b2f0160a8729aacc8fafae46190d58b99b32b1dff

    • SHA512

      155f17dbb814e0cf27c87c3c059a9e5c70f17f3888c8bf70a9775655409a504db84a455f50fa2de52bbec5b962f2a2b9f2ada52012933a05380128d3c36e0652

    • SSDEEP

      6144:q34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:qIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks