General

  • Target

    c1383324b2e990ce15cd88f4bb4628b6_JaffaCakes118

  • Size

    608KB

  • Sample

    240404-yka7bsgf6v

  • MD5

    c1383324b2e990ce15cd88f4bb4628b6

  • SHA1

    ce1e934ec26006b71dabcefbd212881a1b2e40e8

  • SHA256

    c2df742d836b24b2efa000b78f1acad544699070086fb0accf3a49f99cef3136

  • SHA512

    ee08a1ef516f774b3fe0171b8c1d9db5ee157028bd11bfaf98df7a2a7506fb8c1da861f1b11f41db8e6f39e33671dd51797de3c47aa6fdbe7940ed8070ce9dee

  • SSDEEP

    12288:tZGQdqOGuBJqydLqQSeCqsVK8kPRGO35N9mVdzXc6:tZ0uWjeCVVK8kP9N9oh

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      c1383324b2e990ce15cd88f4bb4628b6_JaffaCakes118

    • Size

      608KB

    • MD5

      c1383324b2e990ce15cd88f4bb4628b6

    • SHA1

      ce1e934ec26006b71dabcefbd212881a1b2e40e8

    • SHA256

      c2df742d836b24b2efa000b78f1acad544699070086fb0accf3a49f99cef3136

    • SHA512

      ee08a1ef516f774b3fe0171b8c1d9db5ee157028bd11bfaf98df7a2a7506fb8c1da861f1b11f41db8e6f39e33671dd51797de3c47aa6fdbe7940ed8070ce9dee

    • SSDEEP

      12288:tZGQdqOGuBJqydLqQSeCqsVK8kPRGO35N9mVdzXc6:tZ0uWjeCVVK8kP9N9oh

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks