General

  • Target

    8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8

  • Size

    1.2MB

  • Sample

    210928-lbyj2sbebl

  • MD5

    cbaf988697e5794257533479c39ed20a

  • SHA1

    02d31d47c4bcb4285e847634be7483a31986b29e

  • SHA256

    8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8

  • SHA512

    1fe2bf0286729b423da12dd20e81b80bc781d994afd3b9e3379f620e8ece49cb975b4fbaebe15108e9fb7b7e013c29080b9aa84e83ff562c6c8a190ae046678b

Malware Config

Targets

    • Target

      8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8

    • Size

      1.2MB

    • MD5

      cbaf988697e5794257533479c39ed20a

    • SHA1

      02d31d47c4bcb4285e847634be7483a31986b29e

    • SHA256

      8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8

    • SHA512

      1fe2bf0286729b423da12dd20e81b80bc781d994afd3b9e3379f620e8ece49cb975b4fbaebe15108e9fb7b7e013c29080b9aa84e83ff562c6c8a190ae046678b

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks