General

  • Target

    d7cb31b51d497eaac81246a38db0abd05398832fb301cb1b97d1ca979df2a4ca

  • Size

    2.0MB

  • Sample

    210928-kpwryabcfl

  • MD5

    8a6f4fe59b41d74501e04f1b451dc57d

  • SHA1

    064f5eca3efd02c5f40a8c9e7fedb86aa40eeed0

  • SHA256

    d7cb31b51d497eaac81246a38db0abd05398832fb301cb1b97d1ca979df2a4ca

  • SHA512

    4dfb736dc4e967f964d4a8eac22808fd7249fe39500752bf8b2cc9c197107bc6347ba7da07f20dda47b7d7bd14217792a81222e60f7d648918a93f222ab8084c

Malware Config

Targets

    • Target

      d7cb31b51d497eaac81246a38db0abd05398832fb301cb1b97d1ca979df2a4ca

    • Size

      2.0MB

    • MD5

      8a6f4fe59b41d74501e04f1b451dc57d

    • SHA1

      064f5eca3efd02c5f40a8c9e7fedb86aa40eeed0

    • SHA256

      d7cb31b51d497eaac81246a38db0abd05398832fb301cb1b97d1ca979df2a4ca

    • SHA512

      4dfb736dc4e967f964d4a8eac22808fd7249fe39500752bf8b2cc9c197107bc6347ba7da07f20dda47b7d7bd14217792a81222e60f7d648918a93f222ab8084c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks