General

  • Target

    fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc.exe

  • Size

    816KB

  • Sample

    250205-p43k9aymbr

  • MD5

    f0337ae7fb833cb104ed879681ae3970

  • SHA1

    e4348860984dbd7d231836f7cedc6024450974e6

  • SHA256

    fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc

  • SHA512

    5a3babfefb32649dea5b3bc6fb6e879152bc14348eaa7c33bdca37ba49a02f924b822071c9885c4ae7fe556e1360a0e88478cf5e13064627102bf773c5d4c9a0

  • SSDEEP

    6144:zh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtoC:zh9fKxjNoYxTw9XrRK0dBOJpy0RXR8pJ

Malware Config

Targets

    • Target

      fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc.exe

    • Size

      816KB

    • MD5

      f0337ae7fb833cb104ed879681ae3970

    • SHA1

      e4348860984dbd7d231836f7cedc6024450974e6

    • SHA256

      fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc

    • SHA512

      5a3babfefb32649dea5b3bc6fb6e879152bc14348eaa7c33bdca37ba49a02f924b822071c9885c4ae7fe556e1360a0e88478cf5e13064627102bf773c5d4c9a0

    • SSDEEP

      6144:zh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtoC:zh9fKxjNoYxTw9XrRK0dBOJpy0RXR8pJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks