General

  • Target

    ec1b4985c5084ba8839b24277f41290b_JaffaCakes118

  • Size

    728KB

  • Sample

    240410-16cndsch26

  • MD5

    ec1b4985c5084ba8839b24277f41290b

  • SHA1

    a6c203a547e90e6261a1cf811810693454aa18a9

  • SHA256

    451e558c2bfb7d9477cd9a2d7d453570fe92073d365232e16954413658f31043

  • SHA512

    fa5546ba095223a12081f04c65faa8928841d5b87eda65cf92bc73675e2929a8ab8ba13b86db51a651bb674f56c4b2ce8eb13205aa55e580df07c7199126793d

  • SSDEEP

    12288:K6BBWGJW6eC85Df97+yXUj7SncCxj8iHGo59S1WQSCtEdFO7YKJf6:K6BQBjlc728jo7S1bl6FbK

Malware Config

Targets

    • Target

      ec1b4985c5084ba8839b24277f41290b_JaffaCakes118

    • Size

      728KB

    • MD5

      ec1b4985c5084ba8839b24277f41290b

    • SHA1

      a6c203a547e90e6261a1cf811810693454aa18a9

    • SHA256

      451e558c2bfb7d9477cd9a2d7d453570fe92073d365232e16954413658f31043

    • SHA512

      fa5546ba095223a12081f04c65faa8928841d5b87eda65cf92bc73675e2929a8ab8ba13b86db51a651bb674f56c4b2ce8eb13205aa55e580df07c7199126793d

    • SSDEEP

      12288:K6BBWGJW6eC85Df97+yXUj7SncCxj8iHGo59S1WQSCtEdFO7YKJf6:K6BQBjlc728jo7S1bl6FbK

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks