General

  • Target

    7d9f8480a639dce65dbb09650bbf91b3_JaffaCakes118

  • Size

    608KB

  • Sample

    240401-3rqb2sad5s

  • MD5

    7d9f8480a639dce65dbb09650bbf91b3

  • SHA1

    ced9eaf8509487fff649cd465a78be6194b1470e

  • SHA256

    d5a7171142c2c83f57e5fa0ade763a270f1bf834a7c4fd55ce0fbe73c27b2eeb

  • SHA512

    2e964758ca27710fa05b52f6d056e6b62fca36f643be23a552f7a83d55a38037557a22b553aa7d4f3746fb2080a1ca8d67879f3086535b0feedaf14dcecea371

  • SSDEEP

    12288:LZGQdqOG2vJqydLqQSeCqsVK8kPRGO35N9mVvzXc6V:LZ0QWjeCVVK8kP9N9or/

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      7d9f8480a639dce65dbb09650bbf91b3_JaffaCakes118

    • Size

      608KB

    • MD5

      7d9f8480a639dce65dbb09650bbf91b3

    • SHA1

      ced9eaf8509487fff649cd465a78be6194b1470e

    • SHA256

      d5a7171142c2c83f57e5fa0ade763a270f1bf834a7c4fd55ce0fbe73c27b2eeb

    • SHA512

      2e964758ca27710fa05b52f6d056e6b62fca36f643be23a552f7a83d55a38037557a22b553aa7d4f3746fb2080a1ca8d67879f3086535b0feedaf14dcecea371

    • SSDEEP

      12288:LZGQdqOG2vJqydLqQSeCqsVK8kPRGO35N9mVvzXc6V:LZ0QWjeCVVK8kP9N9or/

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks