General

  • Target

    a13f7f0d72b6bd47eca1422df6227d36_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240612-tf61zs1bph

  • MD5

    a13f7f0d72b6bd47eca1422df6227d36

  • SHA1

    38dcf9b51fd87e88a508e91c4e46906d612ef050

  • SHA256

    e8d148be0eda983cddc2216ca6ce0e6deeb783cfcab645d9911801b52d0b07ef

  • SHA512

    ac93d5d89f0b145c4b20c4ba9f3c42aca4a46fda925c19aaf772a28f0106fc38829d242d4fd9366ba63d2d33122f4640471f51c1327f0863df2562a0d99743e9

  • SSDEEP

    24576:3VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:3V8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Targets

    • Target

      a13f7f0d72b6bd47eca1422df6227d36_JaffaCakes118

    • Size

      1.2MB

    • MD5

      a13f7f0d72b6bd47eca1422df6227d36

    • SHA1

      38dcf9b51fd87e88a508e91c4e46906d612ef050

    • SHA256

      e8d148be0eda983cddc2216ca6ce0e6deeb783cfcab645d9911801b52d0b07ef

    • SHA512

      ac93d5d89f0b145c4b20c4ba9f3c42aca4a46fda925c19aaf772a28f0106fc38829d242d4fd9366ba63d2d33122f4640471f51c1327f0863df2562a0d99743e9

    • SSDEEP

      24576:3VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:3V8hf6STw1ZlQauvzSq01ICe6zvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks