General

  • Target

    bbeb2cd20a1ba49d25bc9a31ed2ab382_JaffaCakes118

  • Size

    986KB

  • Sample

    240618-plvgxsxenm

  • MD5

    bbeb2cd20a1ba49d25bc9a31ed2ab382

  • SHA1

    0cf1a27e3a3223300a6b2c76823678430b9b2196

  • SHA256

    0a28e7ee9defb1086bc03f8a1aff2ded0d1f088e7d6ce37dbadd8ff7d524d297

  • SHA512

    2dea31f1ecc66c3af3a8ebc35355b26293ac772714ee099ae28650f71c2813d615e6c6c1d02c5c239373626322fd1b9811836f20e127f64436d104946185183a

  • SSDEEP

    24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Targets

    • Target

      bbeb2cd20a1ba49d25bc9a31ed2ab382_JaffaCakes118

    • Size

      986KB

    • MD5

      bbeb2cd20a1ba49d25bc9a31ed2ab382

    • SHA1

      0cf1a27e3a3223300a6b2c76823678430b9b2196

    • SHA256

      0a28e7ee9defb1086bc03f8a1aff2ded0d1f088e7d6ce37dbadd8ff7d524d297

    • SHA512

      2dea31f1ecc66c3af3a8ebc35355b26293ac772714ee099ae28650f71c2813d615e6c6c1d02c5c239373626322fd1b9811836f20e127f64436d104946185183a

    • SSDEEP

      24576:dVHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:dV8hf6STw1ZlQauvzSq01ICe6zvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks