General

  • Target

    dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3

  • Size

    1.2MB

  • Sample

    210928-lcgypabdb2

  • MD5

    ecdfff8b0ece2175cd699e690de1fcaf

  • SHA1

    9359770d71e743832ca22597db917dfa817038b2

  • SHA256

    dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3

  • SHA512

    106ecdecdc64b395ae74fd231dc858f0c18a75baba52729ec928451884462d7f5e828f20dd0de3fc750c817d96461708030679873d7a675327b35f51bb8fcc3d

Malware Config

Targets

    • Target

      dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3

    • Size

      1.2MB

    • MD5

      ecdfff8b0ece2175cd699e690de1fcaf

    • SHA1

      9359770d71e743832ca22597db917dfa817038b2

    • SHA256

      dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3

    • SHA512

      106ecdecdc64b395ae74fd231dc858f0c18a75baba52729ec928451884462d7f5e828f20dd0de3fc750c817d96461708030679873d7a675327b35f51bb8fcc3d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks