General

  • Target

    ff5b6160a897fd01392782ff5f3d1e09ab7d1925800196913073e556ca7e4ef9.exe

  • Size

    636KB

  • Sample

    250112-ckxvfatkek

  • MD5

    2819017203728ab41d8f11d0a6feb417

  • SHA1

    6755281aef289eb119dbcbe2132b66ef9f04f03f

  • SHA256

    ff5b6160a897fd01392782ff5f3d1e09ab7d1925800196913073e556ca7e4ef9

  • SHA512

    4399706ce3f26ad718e560257465db3f5d993b190bc6e6efbbffdea0aea040897270d968509319912e93a4f0307860e7471c80dc57a9e1ec77dc6fb3956ea2e6

  • SSDEEP

    12288:VTYHVq1aJ1Px+RT4PSBhPfixLo9lcG7VDqMt8:VU1q8MtFjl179Rt8

Malware Config

Targets

    • Target

      ff5b6160a897fd01392782ff5f3d1e09ab7d1925800196913073e556ca7e4ef9.exe

    • Size

      636KB

    • MD5

      2819017203728ab41d8f11d0a6feb417

    • SHA1

      6755281aef289eb119dbcbe2132b66ef9f04f03f

    • SHA256

      ff5b6160a897fd01392782ff5f3d1e09ab7d1925800196913073e556ca7e4ef9

    • SHA512

      4399706ce3f26ad718e560257465db3f5d993b190bc6e6efbbffdea0aea040897270d968509319912e93a4f0307860e7471c80dc57a9e1ec77dc6fb3956ea2e6

    • SSDEEP

      12288:VTYHVq1aJ1Px+RT4PSBhPfixLo9lcG7VDqMt8:VU1q8MtFjl179Rt8

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks