General

  • Target

    c141b9a07b0399778d5fec3ef4752733_JaffaCakes118

  • Size

    808KB

  • Sample

    241204-g7mefawjes

  • MD5

    c141b9a07b0399778d5fec3ef4752733

  • SHA1

    160d66bde8bb5c86a215373c547503c3f9b8ee59

  • SHA256

    0d13f2263bec1f51944342a3480bd51290abf1d96b31bdaad78202ead85bf179

  • SHA512

    f83207a62afd8425f98943f7346a8517ca3f2e05863ae5c90d9bcc1004df19201a9ea27c68eedbe3422a5634804b0cddb83560a2354988fff2a5e341f0d84ba4

  • SSDEEP

    12288:8dMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:OMIJxSDX3bqjhcfHk7MzH6z

Malware Config

Targets

    • Target

      c141b9a07b0399778d5fec3ef4752733_JaffaCakes118

    • Size

      808KB

    • MD5

      c141b9a07b0399778d5fec3ef4752733

    • SHA1

      160d66bde8bb5c86a215373c547503c3f9b8ee59

    • SHA256

      0d13f2263bec1f51944342a3480bd51290abf1d96b31bdaad78202ead85bf179

    • SHA512

      f83207a62afd8425f98943f7346a8517ca3f2e05863ae5c90d9bcc1004df19201a9ea27c68eedbe3422a5634804b0cddb83560a2354988fff2a5e341f0d84ba4

    • SSDEEP

      12288:8dMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:OMIJxSDX3bqjhcfHk7MzH6z

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks