General

  • Target

    b28fbffaca9e1074a6b02f7aa96f4ca4_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240821-h4ee4azbnn

  • MD5

    b28fbffaca9e1074a6b02f7aa96f4ca4

  • SHA1

    832224f36aa0dc4386000d1783d46dbd1c99fe36

  • SHA256

    fb0cfe24560a2dceaf2d198ffb4ebd793ee92fdedaaf63f54a32addd92728599

  • SHA512

    c14b11357ac2d9657d0186a695a54072e55e598e8dd2f78b789001e8c5d7854a4fbf4cdddf3eb5a86daf8f42da6d7bfe16d4f29997c34c0d6023d0bfcc680bb0

  • SSDEEP

    24576:xuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:j9cKrUqZWLAcU

Malware Config

Targets

    • Target

      b28fbffaca9e1074a6b02f7aa96f4ca4_JaffaCakes118

    • Size

      1.2MB

    • MD5

      b28fbffaca9e1074a6b02f7aa96f4ca4

    • SHA1

      832224f36aa0dc4386000d1783d46dbd1c99fe36

    • SHA256

      fb0cfe24560a2dceaf2d198ffb4ebd793ee92fdedaaf63f54a32addd92728599

    • SHA512

      c14b11357ac2d9657d0186a695a54072e55e598e8dd2f78b789001e8c5d7854a4fbf4cdddf3eb5a86daf8f42da6d7bfe16d4f29997c34c0d6023d0bfcc680bb0

    • SSDEEP

      24576:xuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:j9cKrUqZWLAcU

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks