General

  • Target

    b7e1e2f24a2ae0e31edcb8b01174855054e54e89738e4f2e919faca09a1068a9.exe

  • Size

    620KB

  • Sample

    250217-kd9vesxjhp

  • MD5

    b8eb6a8a27ff90664f44ba2d2f67c283

  • SHA1

    f6d0db5fa77abae397ec6ca9d9320d94749fccdc

  • SHA256

    b7e1e2f24a2ae0e31edcb8b01174855054e54e89738e4f2e919faca09a1068a9

  • SHA512

    13b72a25bf2d865979fa7874890f34b25819c415e830a15eb3146949ab8ce1ecacd540863a28b6708d85ab8b5c35ea0aaf1a3c3f32456751ef0f7fe25fb7e6c1

  • SSDEEP

    12288:TCZm9D4/gh4XcJVaMQCW9hYN0h2ZmrbbFSq08YAXJIUKOe1E:Tkm9Dugh66aMk2ZmrbJSWJmE

Malware Config

Targets

    • Target

      b7e1e2f24a2ae0e31edcb8b01174855054e54e89738e4f2e919faca09a1068a9.exe

    • Size

      620KB

    • MD5

      b8eb6a8a27ff90664f44ba2d2f67c283

    • SHA1

      f6d0db5fa77abae397ec6ca9d9320d94749fccdc

    • SHA256

      b7e1e2f24a2ae0e31edcb8b01174855054e54e89738e4f2e919faca09a1068a9

    • SHA512

      13b72a25bf2d865979fa7874890f34b25819c415e830a15eb3146949ab8ce1ecacd540863a28b6708d85ab8b5c35ea0aaf1a3c3f32456751ef0f7fe25fb7e6c1

    • SSDEEP

      12288:TCZm9D4/gh4XcJVaMQCW9hYN0h2ZmrbbFSq08YAXJIUKOe1E:Tkm9Dugh66aMk2ZmrbJSWJmE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks