General

  • Target

    735987d7f53d7ef2e1bf1a55e1e1d8ce_JaffaCakes118

  • Size

    987KB

  • Sample

    240525-1m63wsbe9x

  • MD5

    735987d7f53d7ef2e1bf1a55e1e1d8ce

  • SHA1

    13119a072097873309619feaf6a6736587d3d944

  • SHA256

    4b3d199a8271663812b5e8a440180946e7e49ed1a06cd0cc71a0bcb0ac17652e

  • SHA512

    a60be5e0ed5e70d5af73762a9948a8608f9b96ef74fb4b24fb78de123bc8ec7e5f26719da8f470ad96c36fc1ca0d99b45d7708faa0c696119551e5f7e43c1819

  • SSDEEP

    24576:6VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:6V8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Targets

    • Target

      735987d7f53d7ef2e1bf1a55e1e1d8ce_JaffaCakes118

    • Size

      987KB

    • MD5

      735987d7f53d7ef2e1bf1a55e1e1d8ce

    • SHA1

      13119a072097873309619feaf6a6736587d3d944

    • SHA256

      4b3d199a8271663812b5e8a440180946e7e49ed1a06cd0cc71a0bcb0ac17652e

    • SHA512

      a60be5e0ed5e70d5af73762a9948a8608f9b96ef74fb4b24fb78de123bc8ec7e5f26719da8f470ad96c36fc1ca0d99b45d7708faa0c696119551e5f7e43c1819

    • SSDEEP

      24576:6VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:6V8hf6STw1ZlQauvzSq01ICe6zvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks