General

  • Target

    fc1e75b51e9de4260bcb837abc916bec_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240420-g3jgzsae36

  • MD5

    fc1e75b51e9de4260bcb837abc916bec

  • SHA1

    6451cb53dd7e19d03c80213a7d361be88edc4a20

  • SHA256

    36193fde792057e518cac9d4c5c6695f5aef317a5b9d32a23b029025e59728b0

  • SHA512

    c58291ba894590ea46e2e5b661aa82af268ee58e2f3a5bf855b8e65fc9f7d9388694c2b4b160ada2656489b19e85e37e2cb6833b279b6115742ebbc74e86fbd5

  • SSDEEP

    12288:zVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:ifP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Targets

    • Target

      fc1e75b51e9de4260bcb837abc916bec_JaffaCakes118

    • Size

      2.2MB

    • MD5

      fc1e75b51e9de4260bcb837abc916bec

    • SHA1

      6451cb53dd7e19d03c80213a7d361be88edc4a20

    • SHA256

      36193fde792057e518cac9d4c5c6695f5aef317a5b9d32a23b029025e59728b0

    • SHA512

      c58291ba894590ea46e2e5b661aa82af268ee58e2f3a5bf855b8e65fc9f7d9388694c2b4b160ada2656489b19e85e37e2cb6833b279b6115742ebbc74e86fbd5

    • SSDEEP

      12288:zVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:ifP7fWsK5z9A+WGAW+V5SB6Ct4bnb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks