General

  • Target

    a9061ada7e7f9927090e10b5dbf31c38_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241127-wmgqsazpgk

  • MD5

    a9061ada7e7f9927090e10b5dbf31c38

  • SHA1

    9a1bf454713bff1a4a950d496f7a562d99a66c30

  • SHA256

    c99b4a39f1f0eed0b89576edc9d847c300ab9377ccb1891f8634f9a195222821

  • SHA512

    7592651bfa304ce92b8adcc01ce2e4ad6d84bf53879d58457288c60d035f2f7cd89e40fdad471c3066b3f963724fe3c648075c4eb10b5e468a37f03a7668ad11

  • SSDEEP

    6144:VK6cyPiWCgknQ/HuyIzuTVzsMM56519p+6yTrkGxM2QDP/ly+VQyMJ8+vp:VM+ZdkmHubeaCo6ak72A/sUQBJ8+vp

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

158.106.98.110:6225

149.210.181.82:10172

178.33.13.40:7443

rc4.plain
rc4.plain

Targets

    • Target

      a9061ada7e7f9927090e10b5dbf31c38_JaffaCakes118

    • Size

      1.1MB

    • MD5

      a9061ada7e7f9927090e10b5dbf31c38

    • SHA1

      9a1bf454713bff1a4a950d496f7a562d99a66c30

    • SHA256

      c99b4a39f1f0eed0b89576edc9d847c300ab9377ccb1891f8634f9a195222821

    • SHA512

      7592651bfa304ce92b8adcc01ce2e4ad6d84bf53879d58457288c60d035f2f7cd89e40fdad471c3066b3f963724fe3c648075c4eb10b5e468a37f03a7668ad11

    • SSDEEP

      6144:VK6cyPiWCgknQ/HuyIzuTVzsMM56519p+6yTrkGxM2QDP/ly+VQyMJ8+vp:VM+ZdkmHubeaCo6ak72A/sUQBJ8+vp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks