General

  • Target

    0d5ca4f77d6d22dbf3436f39ce5124eb658028f8221afcf2c61a7c5f7ec84606N.exe

  • Size

    612KB

  • Sample

    250107-s77wxsyrhp

  • MD5

    5a287791adac2393d92b451658169d70

  • SHA1

    a4b8790be5e611e758193325c3c96240c8613be2

  • SHA256

    0d5ca4f77d6d22dbf3436f39ce5124eb658028f8221afcf2c61a7c5f7ec84606

  • SHA512

    4d6adb6a897552e1d7c460dcd861b3eb533bb18c77b8570301ed17b752ec4dc5db7267ab02b5edab3cb10bf0b95d2d8b6f78b0de2d8366e59e6cb23b9ee1423d

  • SSDEEP

    6144:Eg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWA9:E82AK5HOEksJ1YW7DwzqyQY

Malware Config

Targets

    • Target

      0d5ca4f77d6d22dbf3436f39ce5124eb658028f8221afcf2c61a7c5f7ec84606N.exe

    • Size

      612KB

    • MD5

      5a287791adac2393d92b451658169d70

    • SHA1

      a4b8790be5e611e758193325c3c96240c8613be2

    • SHA256

      0d5ca4f77d6d22dbf3436f39ce5124eb658028f8221afcf2c61a7c5f7ec84606

    • SHA512

      4d6adb6a897552e1d7c460dcd861b3eb533bb18c77b8570301ed17b752ec4dc5db7267ab02b5edab3cb10bf0b95d2d8b6f78b0de2d8366e59e6cb23b9ee1423d

    • SSDEEP

      6144:Eg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWA9:E82AK5HOEksJ1YW7DwzqyQY

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks