General

  • Target

    ae087f890f576dca43d22b3c527b5008547dacd68dfd61440c99370051cc853b

  • Size

    2.0MB

  • Sample

    210928-kpwryabcfp

  • MD5

    dc4fca98a02c5cc7ee5f565c56915c86

  • SHA1

    4cecd255d9176fff8d0ca18cd3dabd690ce02fbf

  • SHA256

    ae087f890f576dca43d22b3c527b5008547dacd68dfd61440c99370051cc853b

  • SHA512

    4954ed3d7ac9fcca73623f1d24a8aaa4ca88727a58a45382e897966311909d0c8d43d709d828e0d3211f6c478ee1ca2bf5970c476c5485a949f5cfbf033e9875

Malware Config

Targets

    • Target

      ae087f890f576dca43d22b3c527b5008547dacd68dfd61440c99370051cc853b

    • Size

      2.0MB

    • MD5

      dc4fca98a02c5cc7ee5f565c56915c86

    • SHA1

      4cecd255d9176fff8d0ca18cd3dabd690ce02fbf

    • SHA256

      ae087f890f576dca43d22b3c527b5008547dacd68dfd61440c99370051cc853b

    • SHA512

      4954ed3d7ac9fcca73623f1d24a8aaa4ca88727a58a45382e897966311909d0c8d43d709d828e0d3211f6c478ee1ca2bf5970c476c5485a949f5cfbf033e9875

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks