General

  • Target

    e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25cN.exe

  • Size

    840KB

  • Sample

    250224-xkdf1symy3

  • MD5

    961ceeaf3c8ae0fcd64c90ae40a63770

  • SHA1

    06965fcda2e5758c8ea9328817b5fe2c634e1db2

  • SHA256

    e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25c

  • SHA512

    98fe6dde368d32fdd66c1b501e8b6415720d5a5f82291b8bf5f0baa45711cac0e853f2235a185770bdd806947682f3a7a57db6d8f945be473324eed4bc034771

  • SSDEEP

    12288:5CZm9D4/gh4XcJVaMQCW9hYN0h2ZmrbbFSq08YAXJIUKOe1Et:5km9Dugh66aMk2ZmrbJSWJmEt

Malware Config

Targets

    • Target

      e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25cN.exe

    • Size

      840KB

    • MD5

      961ceeaf3c8ae0fcd64c90ae40a63770

    • SHA1

      06965fcda2e5758c8ea9328817b5fe2c634e1db2

    • SHA256

      e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25c

    • SHA512

      98fe6dde368d32fdd66c1b501e8b6415720d5a5f82291b8bf5f0baa45711cac0e853f2235a185770bdd806947682f3a7a57db6d8f945be473324eed4bc034771

    • SSDEEP

      12288:5CZm9D4/gh4XcJVaMQCW9hYN0h2ZmrbbFSq08YAXJIUKOe1Et:5km9Dugh66aMk2ZmrbJSWJmEt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks