General

  • Target

    a1773bcb1d4e0d2e6a3531e989e21fc4_JaffaCakes118

  • Size

    785KB

  • Sample

    240817-gv9n7s1cka

  • MD5

    a1773bcb1d4e0d2e6a3531e989e21fc4

  • SHA1

    4903932f94ec058d05ebb58c8d0163cc295de687

  • SHA256

    ba2509192103171273c921d93ddb96478fe2552105aa7dbadddd8138c35ec079

  • SHA512

    02e7b60fa54cdcbc05f08cc93984c51bd3b30a3f8b26a6fe8eb6db65653413c9604b1ae90b2181edaa826b8a7bbcbf76c3018220640b027adb399f4ff85bf6c7

  • SSDEEP

    12288:mbqkjZT1Vu8MpJYosZUmc16RWdrpo8+FFcLxT8HoxmRsDJteMKTm81MOU7qOkQR1:mbqkjZTqxYjxoArwQobmMKdiOUFkK1

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

209.20.87.138:443

198.1.115.153:8172

151.236.29.248:6516

rc4.plain
rc4.plain

Targets

    • Target

      a1773bcb1d4e0d2e6a3531e989e21fc4_JaffaCakes118

    • Size

      785KB

    • MD5

      a1773bcb1d4e0d2e6a3531e989e21fc4

    • SHA1

      4903932f94ec058d05ebb58c8d0163cc295de687

    • SHA256

      ba2509192103171273c921d93ddb96478fe2552105aa7dbadddd8138c35ec079

    • SHA512

      02e7b60fa54cdcbc05f08cc93984c51bd3b30a3f8b26a6fe8eb6db65653413c9604b1ae90b2181edaa826b8a7bbcbf76c3018220640b027adb399f4ff85bf6c7

    • SSDEEP

      12288:mbqkjZT1Vu8MpJYosZUmc16RWdrpo8+FFcLxT8HoxmRsDJteMKTm81MOU7qOkQR1:mbqkjZTqxYjxoArwQobmMKdiOUFkK1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks