General

  • Target

    3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa

  • Size

    608KB

  • Sample

    250218-1s6z3sznfs

  • MD5

    b97901b96456a2d1574acd475800a052

  • SHA1

    9c1898dec863ab35f8271b3dbbbc56fb0321bea4

  • SHA256

    3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa

  • SHA512

    72c745badd19fbff29ed18bb416ebbb362ba89e24185e3e39bd2b0f18536c9f35f5518298883138bd84abd3ddbd51f19bb2a15b18625bb6c7d8960fe9f9f4f32

  • SSDEEP

    6144:ug12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:u82AK5HOEksJ1YW7DwzqyQ

Malware Config

Targets

    • Target

      3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa

    • Size

      608KB

    • MD5

      b97901b96456a2d1574acd475800a052

    • SHA1

      9c1898dec863ab35f8271b3dbbbc56fb0321bea4

    • SHA256

      3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa

    • SHA512

      72c745badd19fbff29ed18bb416ebbb362ba89e24185e3e39bd2b0f18536c9f35f5518298883138bd84abd3ddbd51f19bb2a15b18625bb6c7d8960fe9f9f4f32

    • SSDEEP

      6144:ug12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:u82AK5HOEksJ1YW7DwzqyQ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks