General

  • Target

    21980ef35dee23086acef389e6ce648d8ff396da56b7482b5bc8774120c74b6c.exe

  • Size

    724KB

  • Sample

    250111-ne474sxqfy

  • MD5

    755eb0def2568d37a1d149b3018bdcce

  • SHA1

    e69c1d12dc3d2aa730aa8a9d94757c73777bd54d

  • SHA256

    21980ef35dee23086acef389e6ce648d8ff396da56b7482b5bc8774120c74b6c

  • SHA512

    2ef40d5038c63489149fde266db0e1d440f45a4e8056353ef7e4a70c8df65917a782ceb139955af8cd814704b29c58e548c47c3e521b872fe8e62301d54301ec

  • SSDEEP

    12288:KO3+ivi0RNOR/5DH2InMtdhtvX2tvJljUWcJxm/Osj3lx7l6X0k97L4HAF3itk:7vdvOZ9H2+Mt7tvX2tvJljT/mi1xJ6tX

Malware Config

Targets

    • Target

      21980ef35dee23086acef389e6ce648d8ff396da56b7482b5bc8774120c74b6c.exe

    • Size

      724KB

    • MD5

      755eb0def2568d37a1d149b3018bdcce

    • SHA1

      e69c1d12dc3d2aa730aa8a9d94757c73777bd54d

    • SHA256

      21980ef35dee23086acef389e6ce648d8ff396da56b7482b5bc8774120c74b6c

    • SHA512

      2ef40d5038c63489149fde266db0e1d440f45a4e8056353ef7e4a70c8df65917a782ceb139955af8cd814704b29c58e548c47c3e521b872fe8e62301d54301ec

    • SSDEEP

      12288:KO3+ivi0RNOR/5DH2InMtdhtvX2tvJljUWcJxm/Osj3lx7l6X0k97L4HAF3itk:7vdvOZ9H2+Mt7tvX2tvJljT/mi1xJ6tX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks