General

  • Target

    a5074c49ab453feff2d948de6af25275_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240613-l9sfpaycjm

  • MD5

    a5074c49ab453feff2d948de6af25275

  • SHA1

    099a358c3c87ff9a7cd4f236a31ffd3a2813ffdf

  • SHA256

    5e7128b9f307672c789131c566326f4321f8544d6107f68f85bc8b217728fff8

  • SHA512

    af7c7949656ac3d71b37a0c5810cfc22234a049a43446f5699a6ca21fb051cd6812783ddedd6fc2c034a3f1916365ee6a3d0b3a20b8105ff577d9b44e13ac02f

  • SSDEEP

    24576:guYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NiO:w9cKrUqZWLAcU

Malware Config

Targets

    • Target

      a5074c49ab453feff2d948de6af25275_JaffaCakes118

    • Size

      1.2MB

    • MD5

      a5074c49ab453feff2d948de6af25275

    • SHA1

      099a358c3c87ff9a7cd4f236a31ffd3a2813ffdf

    • SHA256

      5e7128b9f307672c789131c566326f4321f8544d6107f68f85bc8b217728fff8

    • SHA512

      af7c7949656ac3d71b37a0c5810cfc22234a049a43446f5699a6ca21fb051cd6812783ddedd6fc2c034a3f1916365ee6a3d0b3a20b8105ff577d9b44e13ac02f

    • SSDEEP

      24576:guYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NiO:w9cKrUqZWLAcU

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Shellcode

      Detects Dridex Payload shellcode injected in Explorer process.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks