General

  • Target

    ff6cd31f07d94bb47ea90f53731a97ca_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240421-q6l7qacg54

  • MD5

    ff6cd31f07d94bb47ea90f53731a97ca

  • SHA1

    254860df90ab5c6c2e7d8faba7ef4df7e085f3bd

  • SHA256

    51676b3254a014834afdaba33bdff2911b7d87613f0f23201ba14f9d78e2cf99

  • SHA512

    f8eb53555945d2b56030ad281dd04e861ff3183008dd18870ac7fe9623ef76b0679b129e2c925e4bb325675e3467194e888e8079e199df193d9e3974ded25f05

  • SSDEEP

    12288:EVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:hfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Targets

    • Target

      ff6cd31f07d94bb47ea90f53731a97ca_JaffaCakes118

    • Size

      1.9MB

    • MD5

      ff6cd31f07d94bb47ea90f53731a97ca

    • SHA1

      254860df90ab5c6c2e7d8faba7ef4df7e085f3bd

    • SHA256

      51676b3254a014834afdaba33bdff2911b7d87613f0f23201ba14f9d78e2cf99

    • SHA512

      f8eb53555945d2b56030ad281dd04e861ff3183008dd18870ac7fe9623ef76b0679b129e2c925e4bb325675e3467194e888e8079e199df193d9e3974ded25f05

    • SSDEEP

      12288:EVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:hfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks