General

  • Target

    feb0cdef1bbae3c891874e239238c306759eaeeafda6d6017ef79d74cae3f090.exe

  • Size

    640KB

  • Sample

    250121-z7w8ra1me1

  • MD5

    79400f36b44663574f9ca961267285fd

  • SHA1

    7c617fb181a7ab29d505c47cf91d096e61a3439b

  • SHA256

    feb0cdef1bbae3c891874e239238c306759eaeeafda6d6017ef79d74cae3f090

  • SHA512

    05b7806e1a1a09906288870c0c41d5bdbaa5ef061dcd509ed57f5545d2d3bc8f53d6034828f2ef85e728ca3581c7b02eeeeb63a36aa416b9ac711b66526a7b33

  • SSDEEP

    6144:Gg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWA5:G82AK5HOEksJ1YW7DwzqyQw

Malware Config

Targets

    • Target

      feb0cdef1bbae3c891874e239238c306759eaeeafda6d6017ef79d74cae3f090.exe

    • Size

      640KB

    • MD5

      79400f36b44663574f9ca961267285fd

    • SHA1

      7c617fb181a7ab29d505c47cf91d096e61a3439b

    • SHA256

      feb0cdef1bbae3c891874e239238c306759eaeeafda6d6017ef79d74cae3f090

    • SHA512

      05b7806e1a1a09906288870c0c41d5bdbaa5ef061dcd509ed57f5545d2d3bc8f53d6034828f2ef85e728ca3581c7b02eeeeb63a36aa416b9ac711b66526a7b33

    • SSDEEP

      6144:Gg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWA5:G82AK5HOEksJ1YW7DwzqyQw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks