General

  • Target

    96139a57b5965562b2639e2914190a6cfe688c912fb3226454c1a162e7a66997N.exe

  • Size

    840KB

  • Sample

    250117-l4yeratjak

  • MD5

    9029e2cfb9cbc6d6aa6735397f047a20

  • SHA1

    6274d739cf9b64a130a3f783ef3df23387aba24f

  • SHA256

    96139a57b5965562b2639e2914190a6cfe688c912fb3226454c1a162e7a66997

  • SHA512

    0fcd79b49f592dab015d3cd0b7a2705bba5b62d4cf2869bdb2931d60f0dae1ba8bf3351bbdb510109160cf115d49510b2f2acc5bb32f7b7e6feaa96fd41d8d8e

  • SSDEEP

    6144:jh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtoq:jh9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

Malware Config

Targets

    • Target

      96139a57b5965562b2639e2914190a6cfe688c912fb3226454c1a162e7a66997N.exe

    • Size

      840KB

    • MD5

      9029e2cfb9cbc6d6aa6735397f047a20

    • SHA1

      6274d739cf9b64a130a3f783ef3df23387aba24f

    • SHA256

      96139a57b5965562b2639e2914190a6cfe688c912fb3226454c1a162e7a66997

    • SHA512

      0fcd79b49f592dab015d3cd0b7a2705bba5b62d4cf2869bdb2931d60f0dae1ba8bf3351bbdb510109160cf115d49510b2f2acc5bb32f7b7e6feaa96fd41d8d8e

    • SSDEEP

      6144:jh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtoq:jh9fKxjNoYxTw9XrRK0dBOJpy0RXR8p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks