General

  • Target

    be536247ecfde74a90f9f41ed376736d_JaffaCakes118

  • Size

    784KB

  • Sample

    240824-lnj77awbnm

  • MD5

    be536247ecfde74a90f9f41ed376736d

  • SHA1

    e3c0195fcbce731754ad07f1180a80779d9a0b35

  • SHA256

    ff3a35ebb7a529054539464c438c1ac920647e55dac7e8f853cf33c2bfc6da7b

  • SHA512

    e753ddd34acc8628a81f4b855b2828f8f235166ca211597727220085ad0889f8df60774e2fad295c86228f5207b862d72eec1ee0b2f6f2a3e0ec5c45894de68c

  • SSDEEP

    12288:KH2Ijy7t9KVRxsYFPRSo5XkBCLu+PY1iqTrGaFhnt/vqqBhf54MOFNkSr:KH2Cgt9eDpSxP1iqTzVSqBv5OFx

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

209.20.87.138:443

198.1.115.153:8172

151.236.29.248:6516

rc4.plain
rc4.plain

Targets

    • Target

      be536247ecfde74a90f9f41ed376736d_JaffaCakes118

    • Size

      784KB

    • MD5

      be536247ecfde74a90f9f41ed376736d

    • SHA1

      e3c0195fcbce731754ad07f1180a80779d9a0b35

    • SHA256

      ff3a35ebb7a529054539464c438c1ac920647e55dac7e8f853cf33c2bfc6da7b

    • SHA512

      e753ddd34acc8628a81f4b855b2828f8f235166ca211597727220085ad0889f8df60774e2fad295c86228f5207b862d72eec1ee0b2f6f2a3e0ec5c45894de68c

    • SSDEEP

      12288:KH2Ijy7t9KVRxsYFPRSo5XkBCLu+PY1iqTrGaFhnt/vqqBhf54MOFNkSr:KH2Cgt9eDpSxP1iqTzVSqBv5OFx

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks