General

  • Target

    5bbc3a414ecfee5ef1ad3915de9e7275_JaffaCakes118

  • Size

    990KB

  • Sample

    240519-12vy6scg3w

  • MD5

    5bbc3a414ecfee5ef1ad3915de9e7275

  • SHA1

    5d7a2f05e453beca108e0aad77c56716d1aec5c2

  • SHA256

    095248ed3b37a6a13dc0e755bc6480e04b9c6c7f21f05b7c7de8669da2378a91

  • SHA512

    2eeb33941202ca5f5f9b592da09d63e9632c460b35eadd1ace0835439e47c5a92388096dd6cb8afd3aca1a584e7a7215f9f5d7589b990246c60c54c9b03418b5

  • SSDEEP

    24576:iVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:iV8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Targets

    • Target

      5bbc3a414ecfee5ef1ad3915de9e7275_JaffaCakes118

    • Size

      990KB

    • MD5

      5bbc3a414ecfee5ef1ad3915de9e7275

    • SHA1

      5d7a2f05e453beca108e0aad77c56716d1aec5c2

    • SHA256

      095248ed3b37a6a13dc0e755bc6480e04b9c6c7f21f05b7c7de8669da2378a91

    • SHA512

      2eeb33941202ca5f5f9b592da09d63e9632c460b35eadd1ace0835439e47c5a92388096dd6cb8afd3aca1a584e7a7215f9f5d7589b990246c60c54c9b03418b5

    • SSDEEP

      24576:iVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:iV8hf6STw1ZlQauvzSq01ICe6zvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks