General

  • Target

    JaffaCakes118_017b4ac769b9974ed13369628c61fe22

  • Size

    1.3MB

  • Sample

    241231-c8p5hatjfy

  • MD5

    017b4ac769b9974ed13369628c61fe22

  • SHA1

    79d831636d907bf0dc307de55f54e2204965d99f

  • SHA256

    91d2541d318fb264fad336bc2749717b9eb3daed2ac689213c669e975bf7ac90

  • SHA512

    cd643aa6f4f59811dd939dde388a39b801109a84757ee65d316169db30aff797fa9bdff0610933b5ca44c8b86e1bf1d8f69b82aa26e47add1d570d9e3eff885a

  • SSDEEP

    12288:4VgTshBl6L55p615Xw9sJwgApyUhsRbE8X7xYL0yeYiJh0T:XgxI/c5g6JpAcUIbEN0y4

Malware Config

Targets

    • Target

      JaffaCakes118_017b4ac769b9974ed13369628c61fe22

    • Size

      1.3MB

    • MD5

      017b4ac769b9974ed13369628c61fe22

    • SHA1

      79d831636d907bf0dc307de55f54e2204965d99f

    • SHA256

      91d2541d318fb264fad336bc2749717b9eb3daed2ac689213c669e975bf7ac90

    • SHA512

      cd643aa6f4f59811dd939dde388a39b801109a84757ee65d316169db30aff797fa9bdff0610933b5ca44c8b86e1bf1d8f69b82aa26e47add1d570d9e3eff885a

    • SSDEEP

      12288:4VgTshBl6L55p615Xw9sJwgApyUhsRbE8X7xYL0yeYiJh0T:XgxI/c5g6JpAcUIbEN0y4

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Dridex payload

      Detects Dridex x64 core DLL in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks