General

  • Target

    JaffaCakes118_269ca7ec2f86395c6c40fb1f5191d93c1c8cea71283e38d6f66202f54ae3d35d

  • Size

    157KB

  • Sample

    241230-142jqs1mgq

  • MD5

    d196de7229de8968d9191bdce431b44f

  • SHA1

    564e84a2cb728eccc75f6ac024781241a4144acb

  • SHA256

    269ca7ec2f86395c6c40fb1f5191d93c1c8cea71283e38d6f66202f54ae3d35d

  • SHA512

    46dc18cea23f4e44a45d21b1d5b1e0284ff7b452dd3f67764d6e0612ce0d61ab248fb97cc342574deac007d613aaa0f5f8663e5f8b343898a6a2002e69ac5279

  • SSDEEP

    3072:RXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:HMHNLvC1FoCGx//Xq

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_269ca7ec2f86395c6c40fb1f5191d93c1c8cea71283e38d6f66202f54ae3d35d

    • Size

      157KB

    • MD5

      d196de7229de8968d9191bdce431b44f

    • SHA1

      564e84a2cb728eccc75f6ac024781241a4144acb

    • SHA256

      269ca7ec2f86395c6c40fb1f5191d93c1c8cea71283e38d6f66202f54ae3d35d

    • SHA512

      46dc18cea23f4e44a45d21b1d5b1e0284ff7b452dd3f67764d6e0612ce0d61ab248fb97cc342574deac007d613aaa0f5f8663e5f8b343898a6a2002e69ac5279

    • SSDEEP

      3072:RXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:HMHNLvC1FoCGx//Xq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks