General

  • Target

    cc14d5081ffa3a6bd8785a2d20c596b70fe4a637aeb8f6586f6cefe5fedc57a7N.exe

  • Size

    608KB

  • Sample

    250116-rvdxmsvram

  • MD5

    c8f8dc52b65978319a926f2ad2e7a250

  • SHA1

    7593bf6275054d9425175a1a42bc0cf2629e11ed

  • SHA256

    cc14d5081ffa3a6bd8785a2d20c596b70fe4a637aeb8f6586f6cefe5fedc57a7

  • SHA512

    74a6d83e75544ccf6caa5bb2a8ee9dffcfe55c4c5dce3b3057fc216a0f499550178a33f8f73c6cd2135cc391595b6295e9af2cc3ab91e70339113ab0447588bb

  • SSDEEP

    6144:Jg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:J82AK5HOEksJ1YW7DwzqyQ

Malware Config

Targets

    • Target

      cc14d5081ffa3a6bd8785a2d20c596b70fe4a637aeb8f6586f6cefe5fedc57a7N.exe

    • Size

      608KB

    • MD5

      c8f8dc52b65978319a926f2ad2e7a250

    • SHA1

      7593bf6275054d9425175a1a42bc0cf2629e11ed

    • SHA256

      cc14d5081ffa3a6bd8785a2d20c596b70fe4a637aeb8f6586f6cefe5fedc57a7

    • SHA512

      74a6d83e75544ccf6caa5bb2a8ee9dffcfe55c4c5dce3b3057fc216a0f499550178a33f8f73c6cd2135cc391595b6295e9af2cc3ab91e70339113ab0447588bb

    • SSDEEP

      6144:Jg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:J82AK5HOEksJ1YW7DwzqyQ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks