General

  • Target

    a130c1024af7fcf7867614670b20c294d55f5b579a62b2dc630f5cf067863d24

  • Size

    680KB

  • Sample

    241114-vlh2sa1kbt

  • MD5

    f6fd2fc4f63d0ba67c61851cef213a49

  • SHA1

    fe874064329ea907423131cf7a64d0f3b6461d2d

  • SHA256

    a130c1024af7fcf7867614670b20c294d55f5b579a62b2dc630f5cf067863d24

  • SHA512

    3e85f9fc2ea96bd35a36ffcdba6f7c54665666e6cb2eabdf6d5f2bc01dbc6e7b3c64f92e2e3ef626e5fac743527eebdb3698840bf6e0bafa3eeab04a922aa4b1

  • SSDEEP

    6144:e34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:eIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      a130c1024af7fcf7867614670b20c294d55f5b579a62b2dc630f5cf067863d24

    • Size

      680KB

    • MD5

      f6fd2fc4f63d0ba67c61851cef213a49

    • SHA1

      fe874064329ea907423131cf7a64d0f3b6461d2d

    • SHA256

      a130c1024af7fcf7867614670b20c294d55f5b579a62b2dc630f5cf067863d24

    • SHA512

      3e85f9fc2ea96bd35a36ffcdba6f7c54665666e6cb2eabdf6d5f2bc01dbc6e7b3c64f92e2e3ef626e5fac743527eebdb3698840bf6e0bafa3eeab04a922aa4b1

    • SSDEEP

      6144:e34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:eIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks