General

  • Target

    12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789aN.exe

  • Size

    724KB

  • Sample

    250110-3zzwfswpem

  • MD5

    16ff194261d802bb962f116de20281f0

  • SHA1

    fe8d67b2362a86ad47bf63abf68ce997cdc42ea0

  • SHA256

    12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789a

  • SHA512

    9cd53fbce376a94a99ea197bb2d8376e932e2c8a843708205c8c613492657ed1aa731b4bd4d3cdc1e4be8d3229865af7d0bcdeb655e44fd0f53560785be1ecf7

  • SSDEEP

    12288:KO3+ivi0RNOR/5DH2InMtdhtvX2tvJljUWcJxm/Osj3lx7l6X0k97L4HAF3it:7vdvOZ9H2+Mt7tvX2tvJljT/mi1xJ6t6

Malware Config

Targets

    • Target

      12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789aN.exe

    • Size

      724KB

    • MD5

      16ff194261d802bb962f116de20281f0

    • SHA1

      fe8d67b2362a86ad47bf63abf68ce997cdc42ea0

    • SHA256

      12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789a

    • SHA512

      9cd53fbce376a94a99ea197bb2d8376e932e2c8a843708205c8c613492657ed1aa731b4bd4d3cdc1e4be8d3229865af7d0bcdeb655e44fd0f53560785be1ecf7

    • SSDEEP

      12288:KO3+ivi0RNOR/5DH2InMtdhtvX2tvJljUWcJxm/Osj3lx7l6X0k97L4HAF3it:7vdvOZ9H2+Mt7tvX2tvJljT/mi1xJ6t6

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks