General

  • Target

    f8143ea8f659ef91ca5aa037687269adec8ce5259f9ac531edde2735234521d9

  • Size

    608KB

  • Sample

    250114-nvvcvaxmat

  • MD5

    f18239626382b405bdebd360e1d956dc

  • SHA1

    486f6e4037f8b77cdd2b16bb2b3a21874aaa01b4

  • SHA256

    f8143ea8f659ef91ca5aa037687269adec8ce5259f9ac531edde2735234521d9

  • SHA512

    1051db04b59f1db601e51bee911a1cecea93c1b9ff5d99fe060bc5468857a1487eb6043ebf57178e543165166245021050d46de6c7197ccf36ac4c237e3bbf69

  • SSDEEP

    6144:HpwKfEqXZYHYQ3Z6NJoqcHkJY1TBvVxfMe4rMb60+RVTzzikEfmIhVYmp/82Vo:DfExZ0ohJVxft4P0sDCJrYm3C

Malware Config

Targets

    • Target

      f8143ea8f659ef91ca5aa037687269adec8ce5259f9ac531edde2735234521d9

    • Size

      608KB

    • MD5

      f18239626382b405bdebd360e1d956dc

    • SHA1

      486f6e4037f8b77cdd2b16bb2b3a21874aaa01b4

    • SHA256

      f8143ea8f659ef91ca5aa037687269adec8ce5259f9ac531edde2735234521d9

    • SHA512

      1051db04b59f1db601e51bee911a1cecea93c1b9ff5d99fe060bc5468857a1487eb6043ebf57178e543165166245021050d46de6c7197ccf36ac4c237e3bbf69

    • SSDEEP

      6144:HpwKfEqXZYHYQ3Z6NJoqcHkJY1TBvVxfMe4rMb60+RVTzzikEfmIhVYmp/82Vo:DfExZ0ohJVxft4P0sDCJrYm3C

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks