General

  • Target

    05a28642488f39a2a1a9ecd5b543c8d27b845e92b5e18bf0f6a2eb8b93938a00N.exe

  • Size

    836KB

  • Sample

    241220-bhh3tsvpbt

  • MD5

    f842a9d218832132ef62c1eee17f66c0

  • SHA1

    39d87d781628f65db938983f95f399fc9f9640c6

  • SHA256

    05a28642488f39a2a1a9ecd5b543c8d27b845e92b5e18bf0f6a2eb8b93938a00

  • SHA512

    1b3c8183e19d12966f0f5d0e1860d7d479b410c7bf96c4a87666a55be3f97dc8777e92bab1f183298b91c8866136b187b9124830806c5075ce913072290e1eb7

  • SSDEEP

    6144:/h7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtom:/h9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

Malware Config

Targets

    • Target

      05a28642488f39a2a1a9ecd5b543c8d27b845e92b5e18bf0f6a2eb8b93938a00N.exe

    • Size

      836KB

    • MD5

      f842a9d218832132ef62c1eee17f66c0

    • SHA1

      39d87d781628f65db938983f95f399fc9f9640c6

    • SHA256

      05a28642488f39a2a1a9ecd5b543c8d27b845e92b5e18bf0f6a2eb8b93938a00

    • SHA512

      1b3c8183e19d12966f0f5d0e1860d7d479b410c7bf96c4a87666a55be3f97dc8777e92bab1f183298b91c8866136b187b9124830806c5075ce913072290e1eb7

    • SSDEEP

      6144:/h7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtom:/h9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks