General

  • Target

    1e0482474917fc13b85023c02d79e846ac40216c989d3244bb70c22bd8860e94.exe

  • Size

    840KB

  • Sample

    250224-xw9ctszmv3

  • MD5

    d3cfd6a91301bc646456b9463064e409

  • SHA1

    8378609a96a61b53f32c3bdb134675536a0f607a

  • SHA256

    1e0482474917fc13b85023c02d79e846ac40216c989d3244bb70c22bd8860e94

  • SHA512

    af21b632cc1f15f153959600f5c5fbdfadf464033d4d828b5396ae9b57512656ed9c7e2cba0833e7f0246f1a6290aeb7616ed04094ef08dbca4ccce406233612

  • SSDEEP

    12288:5CZm9D4/gh4XcJVaMQCW9hYN0h2ZmrbbFSq08YAXJIUKOe1Etk:5km9Dugh66aMk2ZmrbJSWJmEtk

Malware Config

Targets

    • Target

      1e0482474917fc13b85023c02d79e846ac40216c989d3244bb70c22bd8860e94.exe

    • Size

      840KB

    • MD5

      d3cfd6a91301bc646456b9463064e409

    • SHA1

      8378609a96a61b53f32c3bdb134675536a0f607a

    • SHA256

      1e0482474917fc13b85023c02d79e846ac40216c989d3244bb70c22bd8860e94

    • SHA512

      af21b632cc1f15f153959600f5c5fbdfadf464033d4d828b5396ae9b57512656ed9c7e2cba0833e7f0246f1a6290aeb7616ed04094ef08dbca4ccce406233612

    • SSDEEP

      12288:5CZm9D4/gh4XcJVaMQCW9hYN0h2ZmrbbFSq08YAXJIUKOe1Etk:5km9Dugh66aMk2ZmrbJSWJmEtk

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks