General

  • Target

    f1ef2c7b7bd2a2324eb6f6a7000904d2_JaffaCakes118

  • Size

    848KB

  • Sample

    240415-z1rppaaf4z

  • MD5

    f1ef2c7b7bd2a2324eb6f6a7000904d2

  • SHA1

    80e394b16376c0c80be9fcdb45e1fced3a0a3a71

  • SHA256

    85276985d1a45e22149784e2fcf0064ca7c158e5f4dd629389f759fb82727bb1

  • SHA512

    260146941bb9076c38a433d281921b22b4196001b57c7ad9c6b64fc9c3ad59b87b1d51f70a6e6917e9f270078aa48b29063c20630b02f2565fa02a04d2042b65

  • SSDEEP

    12288:zkbQEkWqv+157EYfxarhwLNuR7ek1tHffB/HzTyNQ6NIeGYr/R:zkbHkWfzZ5adwLNGeStHntqN7v

Malware Config

Targets

    • Target

      f1ef2c7b7bd2a2324eb6f6a7000904d2_JaffaCakes118

    • Size

      848KB

    • MD5

      f1ef2c7b7bd2a2324eb6f6a7000904d2

    • SHA1

      80e394b16376c0c80be9fcdb45e1fced3a0a3a71

    • SHA256

      85276985d1a45e22149784e2fcf0064ca7c158e5f4dd629389f759fb82727bb1

    • SHA512

      260146941bb9076c38a433d281921b22b4196001b57c7ad9c6b64fc9c3ad59b87b1d51f70a6e6917e9f270078aa48b29063c20630b02f2565fa02a04d2042b65

    • SSDEEP

      12288:zkbQEkWqv+157EYfxarhwLNuR7ek1tHffB/HzTyNQ6NIeGYr/R:zkbHkWfzZ5adwLNGeStHntqN7v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks