General

  • Target

    JaffaCakes118_5c936e2db0040737719ea56c32e839354fff133b12ebc343373415c5f4461490

  • Size

    157KB

  • Sample

    241230-18xrca1pal

  • MD5

    b6759f526ac82b22b74008e53be76468

  • SHA1

    957b2ce9be07121df393254713268c93510742a0

  • SHA256

    5c936e2db0040737719ea56c32e839354fff133b12ebc343373415c5f4461490

  • SHA512

    716980b6f5246349e12673119e8b9c2de6dc547e7008d2ccc6b9b25ee776a138b88ab93494b0b33f8b436ca315363948a5dd34e57e2138ef0e95fb4a78794d0e

  • SSDEEP

    3072:FXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:TMHNLvC1FoCGx//Xq

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5c936e2db0040737719ea56c32e839354fff133b12ebc343373415c5f4461490

    • Size

      157KB

    • MD5

      b6759f526ac82b22b74008e53be76468

    • SHA1

      957b2ce9be07121df393254713268c93510742a0

    • SHA256

      5c936e2db0040737719ea56c32e839354fff133b12ebc343373415c5f4461490

    • SHA512

      716980b6f5246349e12673119e8b9c2de6dc547e7008d2ccc6b9b25ee776a138b88ab93494b0b33f8b436ca315363948a5dd34e57e2138ef0e95fb4a78794d0e

    • SSDEEP

      3072:FXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:TMHNLvC1FoCGx//Xq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks