General

  • Target

    JaffaCakes118_f9a9354426d5a9fceba625caae3fbb40a113173837d179a67f1014f79fb52e75

  • Size

    160KB

  • Sample

    241224-btgddaxpft

  • MD5

    ae0af7671e52acc71220255e993a0eb4

  • SHA1

    0b3b74923c880af183e19a00fa9ab1d5f0d90a0d

  • SHA256

    f9a9354426d5a9fceba625caae3fbb40a113173837d179a67f1014f79fb52e75

  • SHA512

    8c8bce1c539d9443e858b8c7c0c16d0f5974a663b82b2a22bee18a07ba5bc00aaac1bf86d352c6692a1a9b04836f9e04416eef7d10b623a1a15ff34e509fa56f

  • SSDEEP

    3072:6UT2d85tleLD51fC5AHYEoefukoTFMpGmj08D:Ey5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f9a9354426d5a9fceba625caae3fbb40a113173837d179a67f1014f79fb52e75

    • Size

      160KB

    • MD5

      ae0af7671e52acc71220255e993a0eb4

    • SHA1

      0b3b74923c880af183e19a00fa9ab1d5f0d90a0d

    • SHA256

      f9a9354426d5a9fceba625caae3fbb40a113173837d179a67f1014f79fb52e75

    • SHA512

      8c8bce1c539d9443e858b8c7c0c16d0f5974a663b82b2a22bee18a07ba5bc00aaac1bf86d352c6692a1a9b04836f9e04416eef7d10b623a1a15ff34e509fa56f

    • SSDEEP

      3072:6UT2d85tleLD51fC5AHYEoefukoTFMpGmj08D:Ey5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks