General

  • Target

    aabbda269fc690bf1270e2f2a727030f_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240819-m2pkhazfjg

  • MD5

    aabbda269fc690bf1270e2f2a727030f

  • SHA1

    1169a82250440dc8ce225e7f936c47e05b1b858e

  • SHA256

    38d90b577fe406506b98dcfa44671fb4623e64a226880bbf52658901e4c9bf0e

  • SHA512

    e524f3c97d7492ffadfac9fdb6e5adcf90d9583e8c9262544757fa43902f715656c14c7ae33f1982930e454174dc703bc24bd4a963aa1479de992bb93b39fee8

  • SSDEEP

    24576:nuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NGpt:J9cKrUqZWLAcU

Malware Config

Targets

    • Target

      aabbda269fc690bf1270e2f2a727030f_JaffaCakes118

    • Size

      1.2MB

    • MD5

      aabbda269fc690bf1270e2f2a727030f

    • SHA1

      1169a82250440dc8ce225e7f936c47e05b1b858e

    • SHA256

      38d90b577fe406506b98dcfa44671fb4623e64a226880bbf52658901e4c9bf0e

    • SHA512

      e524f3c97d7492ffadfac9fdb6e5adcf90d9583e8c9262544757fa43902f715656c14c7ae33f1982930e454174dc703bc24bd4a963aa1479de992bb93b39fee8

    • SSDEEP

      24576:nuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NGpt:J9cKrUqZWLAcU

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks