General

  • Target

    89785c7b62e521f06bca91af6b6f328e_JaffaCakes118

  • Size

    168KB

  • Sample

    240811-h2qekstgmb

  • MD5

    89785c7b62e521f06bca91af6b6f328e

  • SHA1

    f001cf5d5da596084013baa9ae783467cda545ee

  • SHA256

    c1ce668c9d1cfd9ab2a55ea02292ff3f5643aed4d9e0f773dbe1b33cd57b669a

  • SHA512

    e83bd4aa310b5f94cf63194bc96ec921ab40f6a121c819cc1090491e886d864b4afb48af171c4bc6993d14971da83f04e779819e25398dd90404cfeeb27f95d7

  • SSDEEP

    3072:J+rGFFRCMcyzAAykMPqIaXpZYnvf3gx4wblxLSoIm/H2QKGB2gC:J+rGFFlXAAcqj8nHgfOoIdG

Malware Config

Extracted

Family

dridex

Botnet

111

C2

173.203.78.138:443

217.160.107.189:6601

77.220.64.150:5037

rc4.plain
rc4.plain

Targets

    • Target

      89785c7b62e521f06bca91af6b6f328e_JaffaCakes118

    • Size

      168KB

    • MD5

      89785c7b62e521f06bca91af6b6f328e

    • SHA1

      f001cf5d5da596084013baa9ae783467cda545ee

    • SHA256

      c1ce668c9d1cfd9ab2a55ea02292ff3f5643aed4d9e0f773dbe1b33cd57b669a

    • SHA512

      e83bd4aa310b5f94cf63194bc96ec921ab40f6a121c819cc1090491e886d864b4afb48af171c4bc6993d14971da83f04e779819e25398dd90404cfeeb27f95d7

    • SSDEEP

      3072:J+rGFFRCMcyzAAykMPqIaXpZYnvf3gx4wblxLSoIm/H2QKGB2gC:J+rGFFlXAAcqj8nHgfOoIdG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks