General

  • Target

    26976ba397f41991ffdeeff1031bf052_JaffaCakes118

  • Size

    973KB

  • Sample

    241008-2pfjdsvdjj

  • MD5

    26976ba397f41991ffdeeff1031bf052

  • SHA1

    a0978b28fd4ccba8529a9aab00bc370abb1508ff

  • SHA256

    9277022581a6a6565e4a1f7dd5b2c499cf62fd8e176450c0f4b2dca9fc70ce47

  • SHA512

    8665cefa87ce3698443d317e50a71f6baf45467cd1271b2799b49259c634ef742fb1ba95916f482012dd877dec452ea5efdd95c77008e6d5d37a1566034f40ac

  • SSDEEP

    24576:NIuIxBOQNcKv8RtflMQazYZPT29BL0qNsX90nn:i0+YZr2DR6Xg

Malware Config

Targets

    • Target

      26976ba397f41991ffdeeff1031bf052_JaffaCakes118

    • Size

      973KB

    • MD5

      26976ba397f41991ffdeeff1031bf052

    • SHA1

      a0978b28fd4ccba8529a9aab00bc370abb1508ff

    • SHA256

      9277022581a6a6565e4a1f7dd5b2c499cf62fd8e176450c0f4b2dca9fc70ce47

    • SHA512

      8665cefa87ce3698443d317e50a71f6baf45467cd1271b2799b49259c634ef742fb1ba95916f482012dd877dec452ea5efdd95c77008e6d5d37a1566034f40ac

    • SSDEEP

      24576:NIuIxBOQNcKv8RtflMQazYZPT29BL0qNsX90nn:i0+YZr2DR6Xg

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.