General

  • Target

    97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070

  • Size

    1.2MB

  • Sample

    210928-ld769sbdc7

  • MD5

    2955d4759afce09a41c1df5b108f0287

  • SHA1

    11e277c3c987b4119909dd099a5f901e074698e3

  • SHA256

    97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070

  • SHA512

    1cb1adb483d7652ac7c41fc471612d9ee14415763c753e269645a97917050cf1e144daa679f09714a29b9d00d6234606eed407c9735c0d4bb3bfe12ca9b74a80

Malware Config

Targets

    • Target

      97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070

    • Size

      1.2MB

    • MD5

      2955d4759afce09a41c1df5b108f0287

    • SHA1

      11e277c3c987b4119909dd099a5f901e074698e3

    • SHA256

      97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070

    • SHA512

      1cb1adb483d7652ac7c41fc471612d9ee14415763c753e269645a97917050cf1e144daa679f09714a29b9d00d6234606eed407c9735c0d4bb3bfe12ca9b74a80

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks