General

  • Target

    0accd01f0d991f0d00f34c239c2e74fa463911195b13c232099a77fbe43edd8aN.exe

  • Size

    816KB

  • Sample

    250102-f7kp6swjgx

  • MD5

    f91241e27f0a1689d976f33169b245d0

  • SHA1

    2af3e7341f0b6bb0272ceda410fcabdf39fa69b6

  • SHA256

    0accd01f0d991f0d00f34c239c2e74fa463911195b13c232099a77fbe43edd8a

  • SHA512

    3992cad45097a70abdab2b50947ec2c8ab8f4d7cd4307f5bb03c526875368ab62f2d128cb40ad9172ed101b3fc094c9ea5991ddc2867b46408448d90fbbf033e

  • SSDEEP

    6144:zh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtom:zh9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

Malware Config

Targets

    • Target

      0accd01f0d991f0d00f34c239c2e74fa463911195b13c232099a77fbe43edd8aN.exe

    • Size

      816KB

    • MD5

      f91241e27f0a1689d976f33169b245d0

    • SHA1

      2af3e7341f0b6bb0272ceda410fcabdf39fa69b6

    • SHA256

      0accd01f0d991f0d00f34c239c2e74fa463911195b13c232099a77fbe43edd8a

    • SHA512

      3992cad45097a70abdab2b50947ec2c8ab8f4d7cd4307f5bb03c526875368ab62f2d128cb40ad9172ed101b3fc094c9ea5991ddc2867b46408448d90fbbf033e

    • SSDEEP

      6144:zh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtom:zh9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks