General

  • Target

    JaffaCakes118_6735b2ef3bf5fd2292f6f974386daf7a6a1ee861f4b00ad85b23774b16bd5716

  • Size

    160KB

  • Sample

    241224-aesbnawmcm

  • MD5

    02448398e8ba7d45a136b53d9213daf1

  • SHA1

    b8c04b673e062bf01f6f5a4b03d9be7142236708

  • SHA256

    6735b2ef3bf5fd2292f6f974386daf7a6a1ee861f4b00ad85b23774b16bd5716

  • SHA512

    4372fd38d437a7478d65cb64011da42ac7aa9140acdd566a5e765a8fd9e4ad7e337aba525a050c72119ae322859c08b8787f0bed7e0975cb9eb837d7debb4e80

  • SSDEEP

    3072:CnT2d85tleLD51fC5AHYEoefukoTFMpGmjh8D:xy5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6735b2ef3bf5fd2292f6f974386daf7a6a1ee861f4b00ad85b23774b16bd5716

    • Size

      160KB

    • MD5

      02448398e8ba7d45a136b53d9213daf1

    • SHA1

      b8c04b673e062bf01f6f5a4b03d9be7142236708

    • SHA256

      6735b2ef3bf5fd2292f6f974386daf7a6a1ee861f4b00ad85b23774b16bd5716

    • SHA512

      4372fd38d437a7478d65cb64011da42ac7aa9140acdd566a5e765a8fd9e4ad7e337aba525a050c72119ae322859c08b8787f0bed7e0975cb9eb837d7debb4e80

    • SSDEEP

      3072:CnT2d85tleLD51fC5AHYEoefukoTFMpGmjh8D:xy5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks