General

  • Target

    116cfe01ba4f8e6675e8753349585360c328ba3c81849c2e3ac4ee091e1067cd

  • Size

    628KB

  • Sample

    250109-y2bjeszlex

  • MD5

    3d153046432eb2feadc5ca6f0e615c95

  • SHA1

    56cb1e64f9342c485d09e43f7193d185823a6fea

  • SHA256

    116cfe01ba4f8e6675e8753349585360c328ba3c81849c2e3ac4ee091e1067cd

  • SHA512

    307e715cf7a4f4d1efaf0a0b2c1c012853455f6ad9ce536ccb73a8d6bc75b97520b68d0fcab6ee84b1773d278e22dcdc4bba8ea6226215e7adef4279f1442514

  • SSDEEP

    12288:QTYHVq1aJ1Px+RT4PSBhPfixLo9lcG7VDq:QU1q8MtFjl179

Malware Config

Targets

    • Target

      116cfe01ba4f8e6675e8753349585360c328ba3c81849c2e3ac4ee091e1067cd

    • Size

      628KB

    • MD5

      3d153046432eb2feadc5ca6f0e615c95

    • SHA1

      56cb1e64f9342c485d09e43f7193d185823a6fea

    • SHA256

      116cfe01ba4f8e6675e8753349585360c328ba3c81849c2e3ac4ee091e1067cd

    • SHA512

      307e715cf7a4f4d1efaf0a0b2c1c012853455f6ad9ce536ccb73a8d6bc75b97520b68d0fcab6ee84b1773d278e22dcdc4bba8ea6226215e7adef4279f1442514

    • SSDEEP

      12288:QTYHVq1aJ1Px+RT4PSBhPfixLo9lcG7VDq:QU1q8MtFjl179

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks