General

  • Target

    133352b97c6028b55662c0889105c4b6c685e9b44df9de8b6f618127bdeaa4bf

  • Size

    612KB

  • Sample

    250108-y21tba1rcz

  • MD5

    1dbafa84c80a11916e9d7166c6dcf808

  • SHA1

    6687d21118e03b70729ac9327640474e92441e5f

  • SHA256

    133352b97c6028b55662c0889105c4b6c685e9b44df9de8b6f618127bdeaa4bf

  • SHA512

    7954bd519c3dce3c43d8c095a67be257c5bd740f7733797d77f208ade376b33710818f1afe891096190fae187ba659f1c5596c2e6a6ec937ae067112f9e3ff65

  • SSDEEP

    6144:wg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:w82AK5HOEksJ1YW7DwzqyQ

Malware Config

Targets

    • Target

      133352b97c6028b55662c0889105c4b6c685e9b44df9de8b6f618127bdeaa4bf

    • Size

      612KB

    • MD5

      1dbafa84c80a11916e9d7166c6dcf808

    • SHA1

      6687d21118e03b70729ac9327640474e92441e5f

    • SHA256

      133352b97c6028b55662c0889105c4b6c685e9b44df9de8b6f618127bdeaa4bf

    • SHA512

      7954bd519c3dce3c43d8c095a67be257c5bd740f7733797d77f208ade376b33710818f1afe891096190fae187ba659f1c5596c2e6a6ec937ae067112f9e3ff65

    • SSDEEP

      6144:wg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:w82AK5HOEksJ1YW7DwzqyQ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks