General

  • Target

    ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8

  • Size

    608KB

  • Sample

    250223-gnvlpsymfq

  • MD5

    0c311ee344fe160915960e816b4771a0

  • SHA1

    0e273cbc7016ad0c9264918cd6ef0c369effb57a

  • SHA256

    ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8

  • SHA512

    fb78264a74d50f38023c370f2b8d401e6b7465ca630c5fe48d541ec86656d1827174eca4ec25fa65c54c64e480f520a35e96b2a546a2296a707c64435f1f619f

  • SSDEEP

    6144:yg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:y82AK5HOEksJ1YW7DwzqyQ

Malware Config

Targets

    • Target

      ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8

    • Size

      608KB

    • MD5

      0c311ee344fe160915960e816b4771a0

    • SHA1

      0e273cbc7016ad0c9264918cd6ef0c369effb57a

    • SHA256

      ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8

    • SHA512

      fb78264a74d50f38023c370f2b8d401e6b7465ca630c5fe48d541ec86656d1827174eca4ec25fa65c54c64e480f520a35e96b2a546a2296a707c64435f1f619f

    • SSDEEP

      6144:yg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:y82AK5HOEksJ1YW7DwzqyQ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks