General

  • Target

    250510-mjk5cswzf1.bin

  • Size

    1.9MB

  • Sample

    250510-mlsbfsyjv9

  • MD5

    01253cb90896795344709e565d5c0148

  • SHA1

    e24392265b9f452f5dc9c1bd349b7e7c787c3b91

  • SHA256

    fbe5c327747783c6787ea289392e3361cfb229f7d5099cd96d474265c2f4fed7

  • SHA512

    447ed662e0871290bf9ee2d50706201550c210e54365d943b254a096d8a1c6b2b664bdaf5b7996ef95d28eca87207e69d06cb7cd778dfb9c2bcebb384b1a1962

  • SSDEEP

    24576:ZfP7fWsK5z9A+WGAW+V5SB6Ct4bnbTmE:5DW/e+WG0Vo6CtSnvm

Malware Config

Targets

    • Target

      250510-mjk5cswzf1.bin

    • Size

      1.9MB

    • MD5

      01253cb90896795344709e565d5c0148

    • SHA1

      e24392265b9f452f5dc9c1bd349b7e7c787c3b91

    • SHA256

      fbe5c327747783c6787ea289392e3361cfb229f7d5099cd96d474265c2f4fed7

    • SHA512

      447ed662e0871290bf9ee2d50706201550c210e54365d943b254a096d8a1c6b2b664bdaf5b7996ef95d28eca87207e69d06cb7cd778dfb9c2bcebb384b1a1962

    • SSDEEP

      24576:ZfP7fWsK5z9A+WGAW+V5SB6Ct4bnbTmE:5DW/e+WG0Vo6CtSnvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v16

Tasks