General

  • Target

    JaffaCakes118_ff02f1508f274943b8964cc88d762a95e38592c07163571a598738107f32d19e

  • Size

    160KB

  • Sample

    241223-1qccpasmes

  • MD5

    7098dcf95e87f767aa7fdf475bb82eab

  • SHA1

    d0dbb42bbac50f1d6b899a69f640d7669eff33d5

  • SHA256

    ff02f1508f274943b8964cc88d762a95e38592c07163571a598738107f32d19e

  • SHA512

    ca0409365b4ae381eb279e48a3c3a60f83fd33489f4bf1064702c2182ac669433c224504f57c48cf58feb31107db68069c7a5f46857af5b961fb53c357333abc

  • SSDEEP

    3072:f8T2d85tleLD51fC5AHYEoefukoTFMpGmjF8D:zy5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ff02f1508f274943b8964cc88d762a95e38592c07163571a598738107f32d19e

    • Size

      160KB

    • MD5

      7098dcf95e87f767aa7fdf475bb82eab

    • SHA1

      d0dbb42bbac50f1d6b899a69f640d7669eff33d5

    • SHA256

      ff02f1508f274943b8964cc88d762a95e38592c07163571a598738107f32d19e

    • SHA512

      ca0409365b4ae381eb279e48a3c3a60f83fd33489f4bf1064702c2182ac669433c224504f57c48cf58feb31107db68069c7a5f46857af5b961fb53c357333abc

    • SSDEEP

      3072:f8T2d85tleLD51fC5AHYEoefukoTFMpGmjF8D:zy5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks