General

  • Target

    JaffaCakes118_8d64ed3400cb712d6d6c16b36703efdc0c23c99d6dee8070623c168ba1b4a05c

  • Size

    160KB

  • Sample

    241223-zyy1zs1nb1

  • MD5

    4a721ee3ebc3f9c0bc9e6daba23bb00d

  • SHA1

    e4ae76d0087f7758787c0304ad03b674101b772a

  • SHA256

    8d64ed3400cb712d6d6c16b36703efdc0c23c99d6dee8070623c168ba1b4a05c

  • SHA512

    00f0e5d7feb6ad89fa864cb9ba25b160a813b7b763fcf2eeea417ddf3860750cb0f25bf8a6ba49ae1c679100aa9ef654144e6dfb97728f76bb7c5fa3447ff025

  • SSDEEP

    3072:qZT2d85tleLD51fC5AHYEoefukoTFMpGmjG8D:vy5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8d64ed3400cb712d6d6c16b36703efdc0c23c99d6dee8070623c168ba1b4a05c

    • Size

      160KB

    • MD5

      4a721ee3ebc3f9c0bc9e6daba23bb00d

    • SHA1

      e4ae76d0087f7758787c0304ad03b674101b772a

    • SHA256

      8d64ed3400cb712d6d6c16b36703efdc0c23c99d6dee8070623c168ba1b4a05c

    • SHA512

      00f0e5d7feb6ad89fa864cb9ba25b160a813b7b763fcf2eeea417ddf3860750cb0f25bf8a6ba49ae1c679100aa9ef654144e6dfb97728f76bb7c5fa3447ff025

    • SSDEEP

      3072:qZT2d85tleLD51fC5AHYEoefukoTFMpGmjG8D:vy5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks