General

  • Target

    6e544a8ffb2445aa923eb1d2101b307e_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240730-cdtjfawfkh

  • MD5

    6e544a8ffb2445aa923eb1d2101b307e

  • SHA1

    fb9c66973419b7d547e137a8443a8fb3b1f8eb05

  • SHA256

    055baa0bb1920eec3434dbec0463a942536461b5d587ab1db54eca82f54186ef

  • SHA512

    48de8ff2c35dedd305720babdd6a52490c194a7ecaf694a04c926b31e10e4f28129adcfd4edf10133fe27d07bcd929f9ce41c807cc31707ffc31c921bc40b6db

  • SSDEEP

    24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:G9cKrUqZWLAcU

Malware Config

Targets

    • Target

      6e544a8ffb2445aa923eb1d2101b307e_JaffaCakes118

    • Size

      1.2MB

    • MD5

      6e544a8ffb2445aa923eb1d2101b307e

    • SHA1

      fb9c66973419b7d547e137a8443a8fb3b1f8eb05

    • SHA256

      055baa0bb1920eec3434dbec0463a942536461b5d587ab1db54eca82f54186ef

    • SHA512

      48de8ff2c35dedd305720babdd6a52490c194a7ecaf694a04c926b31e10e4f28129adcfd4edf10133fe27d07bcd929f9ce41c807cc31707ffc31c921bc40b6db

    • SSDEEP

      24576:muYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:G9cKrUqZWLAcU

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks