General

  • Target

    2e41aa5a63fd65eeec06fb0a3f6f0f74_JaffaCakes118

  • Size

    990KB

  • Sample

    240510-khs3gada6s

  • MD5

    2e41aa5a63fd65eeec06fb0a3f6f0f74

  • SHA1

    35aab120500000294092906bc18b9932f94341a5

  • SHA256

    9254cc93684a65329fc8c16f8e8ed6efb8414660f3091c9926d92d594e159e5e

  • SHA512

    16f5661d173f6c376c73f38586ae7f059f501f00e518b66cb34f4a0a646db956251b63734061636f12dffb0283636c99d00b4a96086f768eacb1a992c6fd0016

  • SSDEEP

    24576:pVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:pV8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Targets

    • Target

      2e41aa5a63fd65eeec06fb0a3f6f0f74_JaffaCakes118

    • Size

      990KB

    • MD5

      2e41aa5a63fd65eeec06fb0a3f6f0f74

    • SHA1

      35aab120500000294092906bc18b9932f94341a5

    • SHA256

      9254cc93684a65329fc8c16f8e8ed6efb8414660f3091c9926d92d594e159e5e

    • SHA512

      16f5661d173f6c376c73f38586ae7f059f501f00e518b66cb34f4a0a646db956251b63734061636f12dffb0283636c99d00b4a96086f768eacb1a992c6fd0016

    • SSDEEP

      24576:pVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:pV8hf6STw1ZlQauvzSq01ICe6zvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks