General

  • Target

    164ec74b8cd92223749f1f843b8518c3e337360376a5edcda388525029bb3117

  • Size

    676KB

  • Sample

    241114-vncmsa1gmj

  • MD5

    1bf1ac0d053766f0b3f1463c6896953c

  • SHA1

    73aafbff8a7ea3dabe84d5047add7442e52d43b0

  • SHA256

    164ec74b8cd92223749f1f843b8518c3e337360376a5edcda388525029bb3117

  • SHA512

    d292fd9143a267c4dbde98fe9f014cee96686579d8fb8ff692b7dfa420cac3085dd361fb06f81476cfb72ff72a5e53e9f15195dc4ceeeff57e9188b1ac5343d4

  • SSDEEP

    6144:u34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:uIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Targets

    • Target

      164ec74b8cd92223749f1f843b8518c3e337360376a5edcda388525029bb3117

    • Size

      676KB

    • MD5

      1bf1ac0d053766f0b3f1463c6896953c

    • SHA1

      73aafbff8a7ea3dabe84d5047add7442e52d43b0

    • SHA256

      164ec74b8cd92223749f1f843b8518c3e337360376a5edcda388525029bb3117

    • SHA512

      d292fd9143a267c4dbde98fe9f014cee96686579d8fb8ff692b7dfa420cac3085dd361fb06f81476cfb72ff72a5e53e9f15195dc4ceeeff57e9188b1ac5343d4

    • SSDEEP

      6144:u34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:uIKp/UWCZdCDh2IZDwAFRpR6Au

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks