General

  • Target

    9a42c5e67da4cd0db00325a74dae7b31119c3d9159a9239180350319aaccff44.exe

  • Size

    612KB

  • Sample

    250109-flpr1azjax

  • MD5

    23230f7daf4bfbd7d01fb84314852363

  • SHA1

    0a2fa79c5eacf071ed37270b9a5873550c68fd23

  • SHA256

    9a42c5e67da4cd0db00325a74dae7b31119c3d9159a9239180350319aaccff44

  • SHA512

    e31a7adcf455d82eef1f32ac9406641d5118d43e3a313338a1b42cc77c8e82e85f376d2a4410d645811953796dbaa0caae900cbf7f6856758559431957d26124

  • SSDEEP

    6144:Eg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAh:E82AK5HOEksJ1YW7DwzqyQYv

Malware Config

Targets

    • Target

      9a42c5e67da4cd0db00325a74dae7b31119c3d9159a9239180350319aaccff44.exe

    • Size

      612KB

    • MD5

      23230f7daf4bfbd7d01fb84314852363

    • SHA1

      0a2fa79c5eacf071ed37270b9a5873550c68fd23

    • SHA256

      9a42c5e67da4cd0db00325a74dae7b31119c3d9159a9239180350319aaccff44

    • SHA512

      e31a7adcf455d82eef1f32ac9406641d5118d43e3a313338a1b42cc77c8e82e85f376d2a4410d645811953796dbaa0caae900cbf7f6856758559431957d26124

    • SSDEEP

      6144:Eg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAh:E82AK5HOEksJ1YW7DwzqyQYv

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks