General

  • Target

    106616b4d3c012a99a747f9d0e951596_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240503-nht7badc7t

  • MD5

    106616b4d3c012a99a747f9d0e951596

  • SHA1

    a78f314463068a3d3438aff44a1ac85eed0ab282

  • SHA256

    089a19bb3d0bec505d505cb6870fb9b97f14a1bec81d00307e21cfb968d87947

  • SHA512

    3bea54a84d57d1e53b631d241f09730f0c07db7477885b521ef40120afc226e6766f0347bc52d8d082e2971c7f3edc783df3fe6152affea172617d6712ad1725

  • SSDEEP

    24576:kVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:kV8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Targets

    • Target

      106616b4d3c012a99a747f9d0e951596_JaffaCakes118

    • Size

      1.2MB

    • MD5

      106616b4d3c012a99a747f9d0e951596

    • SHA1

      a78f314463068a3d3438aff44a1ac85eed0ab282

    • SHA256

      089a19bb3d0bec505d505cb6870fb9b97f14a1bec81d00307e21cfb968d87947

    • SHA512

      3bea54a84d57d1e53b631d241f09730f0c07db7477885b521ef40120afc226e6766f0347bc52d8d082e2971c7f3edc783df3fe6152affea172617d6712ad1725

    • SSDEEP

      24576:kVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:kV8hf6STw1ZlQauvzSq01ICe6zvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks