General

  • Target

    cc3b7266c278d42cf82847332198b2ef_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240831-e8a2pawdpl

  • MD5

    cc3b7266c278d42cf82847332198b2ef

  • SHA1

    99fd697283f56cef6ace5f851f0c9b631ae13906

  • SHA256

    7ba8fd7fe1279dd20b2b62168cdc5436acb2b61c6725f57dd79d583206b7751b

  • SHA512

    c9dd0b22e95d982c7f36e398038cbcf732cc6d65b65d7210407e9f05a97758908f99693eeb19391613fe9c3869b35375764b747bd5ac9500a0b805c61396b75a

  • SSDEEP

    24576:xQGaLTG43lNgtOtBjeDYtJqVIjtkbiNKydy7Ducn3YQdfzbgS8JtjdsJxQ7lxO6N:I

Malware Config

Extracted

Family

dridex

C2

176.126.243.82:443

167.114.122.37:691

66.34.201.20:8443

46.105.111.191:691

Targets

    • Target

      cc3b7266c278d42cf82847332198b2ef_JaffaCakes118

    • Size

      1.4MB

    • MD5

      cc3b7266c278d42cf82847332198b2ef

    • SHA1

      99fd697283f56cef6ace5f851f0c9b631ae13906

    • SHA256

      7ba8fd7fe1279dd20b2b62168cdc5436acb2b61c6725f57dd79d583206b7751b

    • SHA512

      c9dd0b22e95d982c7f36e398038cbcf732cc6d65b65d7210407e9f05a97758908f99693eeb19391613fe9c3869b35375764b747bd5ac9500a0b805c61396b75a

    • SSDEEP

      24576:xQGaLTG43lNgtOtBjeDYtJqVIjtkbiNKydy7Ducn3YQdfzbgS8JtjdsJxQ7lxO6N:I

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks