General

  • Target

    881b352be9266c4248771ef2acce5b62a60237cbba6ad38daa7ed73963e1e23a

  • Size

    640KB

  • Sample

    250115-eplzvaslhq

  • MD5

    0afd88ff0d49dd85a2cbe6ad3e2f3fba

  • SHA1

    eb6ccf9c85fed02fad138748fc85b02074d564ac

  • SHA256

    881b352be9266c4248771ef2acce5b62a60237cbba6ad38daa7ed73963e1e23a

  • SHA512

    cab93e1099e9e54a92be52352c7b09cf9481961ffe9ee95f91ff5c2f4f69e04b94ce53ec831bafe047f90635c0beb48096abdb1a0f53ba9779e99457951459a0

  • SSDEEP

    6144:Gg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:G82AK5HOEksJ1YW7DwzqyQ

Malware Config

Targets

    • Target

      881b352be9266c4248771ef2acce5b62a60237cbba6ad38daa7ed73963e1e23a

    • Size

      640KB

    • MD5

      0afd88ff0d49dd85a2cbe6ad3e2f3fba

    • SHA1

      eb6ccf9c85fed02fad138748fc85b02074d564ac

    • SHA256

      881b352be9266c4248771ef2acce5b62a60237cbba6ad38daa7ed73963e1e23a

    • SHA512

      cab93e1099e9e54a92be52352c7b09cf9481961ffe9ee95f91ff5c2f4f69e04b94ce53ec831bafe047f90635c0beb48096abdb1a0f53ba9779e99457951459a0

    • SSDEEP

      6144:Gg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:G82AK5HOEksJ1YW7DwzqyQ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks