General

  • Target

    80184eee522c0774f344f21d1b042fde_JaffaCakes118

  • Size

    988KB

  • Sample

    240529-kbbjvage4w

  • MD5

    80184eee522c0774f344f21d1b042fde

  • SHA1

    729c582affc7f092ecde4843fefea5c9b8ef0eda

  • SHA256

    b0b20b7a4671e450e009be0837c965d13511fb3a19df8f0d9d2fa47be720b1b6

  • SHA512

    5d47bfb61235e2f0950903b8ab776e106a2a077ed582749edfff9705b1da73104dba72a5f1a668689b2bc15f1c2b2e72de441ed6a7afda43e8bd5d6230ddba55

  • SSDEEP

    24576:+VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:+V8hf6STw1ZlQauvzSq01ICe6zvm

Malware Config

Targets

    • Target

      80184eee522c0774f344f21d1b042fde_JaffaCakes118

    • Size

      988KB

    • MD5

      80184eee522c0774f344f21d1b042fde

    • SHA1

      729c582affc7f092ecde4843fefea5c9b8ef0eda

    • SHA256

      b0b20b7a4671e450e009be0837c965d13511fb3a19df8f0d9d2fa47be720b1b6

    • SHA512

      5d47bfb61235e2f0950903b8ab776e106a2a077ed582749edfff9705b1da73104dba72a5f1a668689b2bc15f1c2b2e72de441ed6a7afda43e8bd5d6230ddba55

    • SSDEEP

      24576:+VHchfFcSTdS1ZikTqpaIJvzSqbY/0Z2ZlECMNXkTlzvmJL8:+V8hf6STw1ZlQauvzSq01ICe6zvm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks