General

  • Target

    75f422efd262f9ac592bce3923b002004354138d2c5517bcacc87d5c24cbda16

  • Size

    700KB

  • Sample

    241114-vm8nts1gja

  • MD5

    558bbcc95d7c303c8344a2926d04d498

  • SHA1

    b1bb749b3f56ba22aba58421acc3f30d81eeda14

  • SHA256

    75f422efd262f9ac592bce3923b002004354138d2c5517bcacc87d5c24cbda16

  • SHA512

    9055ee1a2e5508eb6e500773ba037bd82a94a8a39584ea865bd1b87f55e7b9ab90626245a1ecd44cdfc5ad974fd618e55f35f0d4433b5359b8aa6326472ed90d

  • SSDEEP

    6144:c34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTL:cIKp/UWCZdCDh2IZDwAFRpR6Aub

Malware Config

Targets

    • Target

      75f422efd262f9ac592bce3923b002004354138d2c5517bcacc87d5c24cbda16

    • Size

      700KB

    • MD5

      558bbcc95d7c303c8344a2926d04d498

    • SHA1

      b1bb749b3f56ba22aba58421acc3f30d81eeda14

    • SHA256

      75f422efd262f9ac592bce3923b002004354138d2c5517bcacc87d5c24cbda16

    • SHA512

      9055ee1a2e5508eb6e500773ba037bd82a94a8a39584ea865bd1b87f55e7b9ab90626245a1ecd44cdfc5ad974fd618e55f35f0d4433b5359b8aa6326472ed90d

    • SSDEEP

      6144:c34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTL:cIKp/UWCZdCDh2IZDwAFRpR6Aub

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks