General

  • Target

    045312c9cdff862a639fddf2e7fbeb4639aee88ca0de4c65a0896e4f4b2e04d4N.exe

  • Size

    656KB

  • Sample

    241219-zp5r6szmfm

  • MD5

    1da8af34b2f2631b771affe4384b36c0

  • SHA1

    dfdbb0206683407e6fedc9e9b740886b308617ee

  • SHA256

    045312c9cdff862a639fddf2e7fbeb4639aee88ca0de4c65a0896e4f4b2e04d4

  • SHA512

    2d6bf3813c7c462dca944dc4a6a9b344660ee5217e80b9ab55bf5b0a19e6f95f4f616dac09b1cca20087da06df847bb52c5cc419233dcf3414855a9f600126f7

  • SSDEEP

    6144:Xg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:X82AK5HOEksJ1YW7DwzqyQ

Malware Config

Targets

    • Target

      045312c9cdff862a639fddf2e7fbeb4639aee88ca0de4c65a0896e4f4b2e04d4N.exe

    • Size

      656KB

    • MD5

      1da8af34b2f2631b771affe4384b36c0

    • SHA1

      dfdbb0206683407e6fedc9e9b740886b308617ee

    • SHA256

      045312c9cdff862a639fddf2e7fbeb4639aee88ca0de4c65a0896e4f4b2e04d4

    • SHA512

      2d6bf3813c7c462dca944dc4a6a9b344660ee5217e80b9ab55bf5b0a19e6f95f4f616dac09b1cca20087da06df847bb52c5cc419233dcf3414855a9f600126f7

    • SSDEEP

      6144:Xg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:X82AK5HOEksJ1YW7DwzqyQ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks