General

  • Target

    ee050dfdeadc9c89fff9d03927fb8cd873abcdea4b07205876bc3a8e215f66fc.exe

  • Size

    604KB

  • Sample

    250117-bz8d2symdj

  • MD5

    1dd7a542bcc6525f4ae8662848fd3312

  • SHA1

    60acf1e1b9ca208628040c5dcee46b7f4bfeabcc

  • SHA256

    ee050dfdeadc9c89fff9d03927fb8cd873abcdea4b07205876bc3a8e215f66fc

  • SHA512

    c563f899db3f00687e8e56266da5c45d72093830d5a84ddf3f553830b293269be4a3934c55787a3521bfdbda73acce687580db58a964e321ff7ce1282f95deaa

  • SSDEEP

    6144:bg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAL:b82AK5HOEksJ1YW7DwzqyQq

Malware Config

Targets

    • Target

      ee050dfdeadc9c89fff9d03927fb8cd873abcdea4b07205876bc3a8e215f66fc.exe

    • Size

      604KB

    • MD5

      1dd7a542bcc6525f4ae8662848fd3312

    • SHA1

      60acf1e1b9ca208628040c5dcee46b7f4bfeabcc

    • SHA256

      ee050dfdeadc9c89fff9d03927fb8cd873abcdea4b07205876bc3a8e215f66fc

    • SHA512

      c563f899db3f00687e8e56266da5c45d72093830d5a84ddf3f553830b293269be4a3934c55787a3521bfdbda73acce687580db58a964e321ff7ce1282f95deaa

    • SSDEEP

      6144:bg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAL:b82AK5HOEksJ1YW7DwzqyQq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks