General

  • Target

    f6e4247c7f98ddd1f7200ef4a80c4c36_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240418-anbp9sch9w

  • MD5

    f6e4247c7f98ddd1f7200ef4a80c4c36

  • SHA1

    ee19fa68cdb4c13cf723348923050102b77b46a1

  • SHA256

    96e241ddaf882e839b7508f6878ad5d11f000bce3fbd46e06bc6282b3391d8da

  • SHA512

    0610759a5936f5d4836cd1afa0c27265fbaa6e29f9702901f2efebbc6517c377e93e4a6f1c84a877dda8dd9a96019fbb20b200e39cb41401d76851227fc7c46c

  • SSDEEP

    12288:NVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:UfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Targets

    • Target

      f6e4247c7f98ddd1f7200ef4a80c4c36_JaffaCakes118

    • Size

      3.4MB

    • MD5

      f6e4247c7f98ddd1f7200ef4a80c4c36

    • SHA1

      ee19fa68cdb4c13cf723348923050102b77b46a1

    • SHA256

      96e241ddaf882e839b7508f6878ad5d11f000bce3fbd46e06bc6282b3391d8da

    • SHA512

      0610759a5936f5d4836cd1afa0c27265fbaa6e29f9702901f2efebbc6517c377e93e4a6f1c84a877dda8dd9a96019fbb20b200e39cb41401d76851227fc7c46c

    • SSDEEP

      12288:NVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:UfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks