General

  • Target

    2f8c8a12a31d244689c70b428031eb90f3b791323ab6dfa45e2a3d5921877991

  • Size

    2.2MB

  • Sample

    210928-knq53abbe5

  • MD5

    31058530a762dc9f9bb34d28203f5314

  • SHA1

    28c5d0fc080868ebb37050a565796f19a48eee87

  • SHA256

    2f8c8a12a31d244689c70b428031eb90f3b791323ab6dfa45e2a3d5921877991

  • SHA512

    25d0a92ea515cd45e6a9dac030e39a30e72a64cf7eb6473daa35ad7cf5bc9db272c7511bd2675907091a8f06993d15511c9d13bf1d60edbf221629c235e57282

Malware Config

Targets

    • Target

      2f8c8a12a31d244689c70b428031eb90f3b791323ab6dfa45e2a3d5921877991

    • Size

      2.2MB

    • MD5

      31058530a762dc9f9bb34d28203f5314

    • SHA1

      28c5d0fc080868ebb37050a565796f19a48eee87

    • SHA256

      2f8c8a12a31d244689c70b428031eb90f3b791323ab6dfa45e2a3d5921877991

    • SHA512

      25d0a92ea515cd45e6a9dac030e39a30e72a64cf7eb6473daa35ad7cf5bc9db272c7511bd2675907091a8f06993d15511c9d13bf1d60edbf221629c235e57282

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks