General

  • Target

    51f1a8d4410d73d9176dcd9625d7522c719e816e43bffda25085e63161d789b0

  • Size

    672KB

  • Sample

    241114-vm9wws1gjb

  • MD5

    583d65e532c265246326dd54fca82723

  • SHA1

    459a26aa86533f45c0dc34201174d773d9c00e45

  • SHA256

    51f1a8d4410d73d9176dcd9625d7522c719e816e43bffda25085e63161d789b0

  • SHA512

    31b313d6bfbe3eff58ceace0a442c83ec4eeb183b2281a79bbe66527c171bc866adfb5f9c9f1b5ea8f54046278c30eaa9f215dfcf207e76ac6e63dd3555dd94b

  • SSDEEP

    6144:R34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:RIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      51f1a8d4410d73d9176dcd9625d7522c719e816e43bffda25085e63161d789b0

    • Size

      672KB

    • MD5

      583d65e532c265246326dd54fca82723

    • SHA1

      459a26aa86533f45c0dc34201174d773d9c00e45

    • SHA256

      51f1a8d4410d73d9176dcd9625d7522c719e816e43bffda25085e63161d789b0

    • SHA512

      31b313d6bfbe3eff58ceace0a442c83ec4eeb183b2281a79bbe66527c171bc866adfb5f9c9f1b5ea8f54046278c30eaa9f215dfcf207e76ac6e63dd3555dd94b

    • SSDEEP

      6144:R34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:RIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks