General

  • Target

    250604-a1fjzshm2t.bin

  • Size

    1.7MB

  • Sample

    250604-a3yhkshm4w

  • MD5

    0d240d867a33e3c3634c92374e7e65ee

  • SHA1

    1a57f248951d26cb1c7051e4da87876c8781e685

  • SHA256

    5201ab2442db366f770849db6f1565ae85fc4cced18256486c08da3b2566283d

  • SHA512

    ef91db285df8fbae6c865ede735a94a37736919ec10bc578d86997fc8d3142e1e92791b3d5219e9fcf26a147457d61de6f2715f5d639c4de6450ab382917c006

  • SSDEEP

    12288:CVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:ffP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Targets

    • Target

      250604-a1fjzshm2t.bin

    • Size

      1.7MB

    • MD5

      0d240d867a33e3c3634c92374e7e65ee

    • SHA1

      1a57f248951d26cb1c7051e4da87876c8781e685

    • SHA256

      5201ab2442db366f770849db6f1565ae85fc4cced18256486c08da3b2566283d

    • SHA512

      ef91db285df8fbae6c865ede735a94a37736919ec10bc578d86997fc8d3142e1e92791b3d5219e9fcf26a147457d61de6f2715f5d639c4de6450ab382917c006

    • SSDEEP

      12288:CVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:ffP7fWsK5z9A+WGAW+V5SB6Ct4bnb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v16

Tasks