General

  • Target

    JaffaCakes118_9c17d88097a81d40ec4350d3514673aaf8f239948c8d57c4a2b02d7339420288

  • Size

    204KB

  • Sample

    241230-1j52essqbw

  • MD5

    ddf2b22597913e5a418ccea5284babcc

  • SHA1

    78f43514ea12088a842421bab6fbab94070a5094

  • SHA256

    9c17d88097a81d40ec4350d3514673aaf8f239948c8d57c4a2b02d7339420288

  • SHA512

    7102088ac609c59123a124c2d017347c6d55fd47e48150ff2a62384bd57037cec2b389074245b6dde1c47cae2f8ccca8c62351b7deeea5f1353cf76ef018a01b

  • SSDEEP

    3072:qBHfDmTQoHJhc+1aImpJRxSmR7bVsSazalcBfc7Ivu5IMlZ:qBHLSc+wLJRHFVsSaGluUs25Iw

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9c17d88097a81d40ec4350d3514673aaf8f239948c8d57c4a2b02d7339420288

    • Size

      204KB

    • MD5

      ddf2b22597913e5a418ccea5284babcc

    • SHA1

      78f43514ea12088a842421bab6fbab94070a5094

    • SHA256

      9c17d88097a81d40ec4350d3514673aaf8f239948c8d57c4a2b02d7339420288

    • SHA512

      7102088ac609c59123a124c2d017347c6d55fd47e48150ff2a62384bd57037cec2b389074245b6dde1c47cae2f8ccca8c62351b7deeea5f1353cf76ef018a01b

    • SSDEEP

      3072:qBHfDmTQoHJhc+1aImpJRxSmR7bVsSazalcBfc7Ivu5IMlZ:qBHLSc+wLJRHFVsSaGluUs25Iw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks