General

  • Target

    6718e467aff11be4be91129c2fe6ca21e57c03cc6fc111372e35239124b138c2.exe

  • Size

    840KB

  • Sample

    250116-b346sswlhr

  • MD5

    0fb80ea377a108e001f27a2e143524d5

  • SHA1

    2bcb413b0be7a79e09f5cd6c1cdad854d872c9fb

  • SHA256

    6718e467aff11be4be91129c2fe6ca21e57c03cc6fc111372e35239124b138c2

  • SHA512

    993852c82fbcb01b7ea302b6bc024dfe44931da34b6290344adbed01b759851b16d8c50cbf9e93db2dcb2ee607ddde234b4faf169373238cf6c2f8559647424f

  • SSDEEP

    6144:jh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtod:jh9fKxjNoYxTw9XrRK0dBOJpy0RXR8pS

Malware Config

Targets

    • Target

      6718e467aff11be4be91129c2fe6ca21e57c03cc6fc111372e35239124b138c2.exe

    • Size

      840KB

    • MD5

      0fb80ea377a108e001f27a2e143524d5

    • SHA1

      2bcb413b0be7a79e09f5cd6c1cdad854d872c9fb

    • SHA256

      6718e467aff11be4be91129c2fe6ca21e57c03cc6fc111372e35239124b138c2

    • SHA512

      993852c82fbcb01b7ea302b6bc024dfe44931da34b6290344adbed01b759851b16d8c50cbf9e93db2dcb2ee607ddde234b4faf169373238cf6c2f8559647424f

    • SSDEEP

      6144:jh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtod:jh9fKxjNoYxTw9XrRK0dBOJpy0RXR8pS

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks