General

  • Target

    04a38ad247b76dc07abd862aaed2bf751d79c3baf8cc683763c7284a30c6c5c8N.exe

  • Size

    820KB

  • Sample

    241220-adcjtatnhy

  • MD5

    af36893cc5b429fa02560e38cf3906f0

  • SHA1

    f5430b9efe75be9bd867e952b292f3980bf49d75

  • SHA256

    04a38ad247b76dc07abd862aaed2bf751d79c3baf8cc683763c7284a30c6c5c8

  • SHA512

    310feb29f12d357b1c260c02a31c87e70b78d13e4f1c2e778a439747cac67f613bc7345894cb0b71102b1d45b63b20c1171a62edd2c8345cd00eae59621e1863

  • SSDEEP

    6144:Th7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtom:Th9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

Malware Config

Targets

    • Target

      04a38ad247b76dc07abd862aaed2bf751d79c3baf8cc683763c7284a30c6c5c8N.exe

    • Size

      820KB

    • MD5

      af36893cc5b429fa02560e38cf3906f0

    • SHA1

      f5430b9efe75be9bd867e952b292f3980bf49d75

    • SHA256

      04a38ad247b76dc07abd862aaed2bf751d79c3baf8cc683763c7284a30c6c5c8

    • SHA512

      310feb29f12d357b1c260c02a31c87e70b78d13e4f1c2e778a439747cac67f613bc7345894cb0b71102b1d45b63b20c1171a62edd2c8345cd00eae59621e1863

    • SSDEEP

      6144:Th7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtom:Th9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks