General

  • Target

    b39e2d4ed0d4f9e27f33a431f6cf8a9b_JaffaCakes118

  • Size

    608KB

  • Sample

    240404-kf42ysba32

  • MD5

    b39e2d4ed0d4f9e27f33a431f6cf8a9b

  • SHA1

    3551902ce8b340a1bd834a68e4044f7bfd9f8683

  • SHA256

    50cd54b0c2b933ff3b79cac46e54e74bc45cb5f6f46a141cd877a5b04a0f672b

  • SHA512

    d5f30b0e7d8dc40ec427614c7bc0b24eafabf860773dd1392a3d3d0a4c62b4d9e027e21fb297541f581b256ea8cad72e173312cc35890261613234b8ec7999c2

  • SSDEEP

    12288:7ZGQdqOGzJJqydLqQSeCqsVK8kPRGO35N9mVpzXc6:7Z09WjeCVVK8kP9N9ol

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      b39e2d4ed0d4f9e27f33a431f6cf8a9b_JaffaCakes118

    • Size

      608KB

    • MD5

      b39e2d4ed0d4f9e27f33a431f6cf8a9b

    • SHA1

      3551902ce8b340a1bd834a68e4044f7bfd9f8683

    • SHA256

      50cd54b0c2b933ff3b79cac46e54e74bc45cb5f6f46a141cd877a5b04a0f672b

    • SHA512

      d5f30b0e7d8dc40ec427614c7bc0b24eafabf860773dd1392a3d3d0a4c62b4d9e027e21fb297541f581b256ea8cad72e173312cc35890261613234b8ec7999c2

    • SSDEEP

      12288:7ZGQdqOGzJJqydLqQSeCqsVK8kPRGO35N9mVpzXc6:7Z09WjeCVVK8kP9N9ol

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks