General

  • Target

    d8bc15335ca8daa9a8a67fc2261636775be4dde332d8a0944017676926236da3

  • Size

    2.0MB

  • Sample

    210928-k4gassbca8

  • MD5

    c10ee36fe08388fce375f320660bc91c

  • SHA1

    6477666e70f87ff53040e98f324660a5167eb4f4

  • SHA256

    d8bc15335ca8daa9a8a67fc2261636775be4dde332d8a0944017676926236da3

  • SHA512

    9fa8df612db5d4da32d2a5531e752b668a503fc49c45aecb9a2df4f95964671712f410a74a76cd677aba005bd4f119070893fc6d6fbaff66d9617cbf45764587

Malware Config

Targets

    • Target

      d8bc15335ca8daa9a8a67fc2261636775be4dde332d8a0944017676926236da3

    • Size

      2.0MB

    • MD5

      c10ee36fe08388fce375f320660bc91c

    • SHA1

      6477666e70f87ff53040e98f324660a5167eb4f4

    • SHA256

      d8bc15335ca8daa9a8a67fc2261636775be4dde332d8a0944017676926236da3

    • SHA512

      9fa8df612db5d4da32d2a5531e752b668a503fc49c45aecb9a2df4f95964671712f410a74a76cd677aba005bd4f119070893fc6d6fbaff66d9617cbf45764587

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks