General

  • Target

    ed8a0903acc91ddaccb32df0e10be50bb8ba8d0c1486b30536c0bbda2512008e.exe

  • Size

    608KB

  • Sample

    250117-rwqb3a1qgz

  • MD5

    d0f174bb1f0e5ffc98b4c361a7667b87

  • SHA1

    0dfd110ebf8c052ce0bb5dd888baa1f19380df05

  • SHA256

    ed8a0903acc91ddaccb32df0e10be50bb8ba8d0c1486b30536c0bbda2512008e

  • SHA512

    f427a7e8597eee4274ac3ac5beddb48948f2e24c8f66a970b0a7a587d243ef154332c521d846d0cb88bf27d64979049e19fc6244595bb8eefe336bb903b2dd24

  • SSDEEP

    6144:Jg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAV:J82AK5HOEksJ1YW7DwzqyQg

Malware Config

Targets

    • Target

      ed8a0903acc91ddaccb32df0e10be50bb8ba8d0c1486b30536c0bbda2512008e.exe

    • Size

      608KB

    • MD5

      d0f174bb1f0e5ffc98b4c361a7667b87

    • SHA1

      0dfd110ebf8c052ce0bb5dd888baa1f19380df05

    • SHA256

      ed8a0903acc91ddaccb32df0e10be50bb8ba8d0c1486b30536c0bbda2512008e

    • SHA512

      f427a7e8597eee4274ac3ac5beddb48948f2e24c8f66a970b0a7a587d243ef154332c521d846d0cb88bf27d64979049e19fc6244595bb8eefe336bb903b2dd24

    • SSDEEP

      6144:Jg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAV:J82AK5HOEksJ1YW7DwzqyQg

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks