General

  • Target

    JaffaCakes118_8384f619c397d12b2965e919cb145a0d0bfcfeccba1f5d51bf4648ddb89a03cb

  • Size

    204KB

  • Sample

    241230-1mct2ssqgw

  • MD5

    4ed8e6e0f4d0af5b78b92eced87f8e19

  • SHA1

    11efbc493c41204cf75859dfa082f1d1fb2dd427

  • SHA256

    8384f619c397d12b2965e919cb145a0d0bfcfeccba1f5d51bf4648ddb89a03cb

  • SHA512

    ed6f939495e02225e761699ef76eac99793792b22c22751c6e54278fcf615ec61698fda8eebab7374d300f9bfbb290a46a130cb0401a0325a588a2a3db3bf30a

  • SSDEEP

    3072:M6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:MZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8384f619c397d12b2965e919cb145a0d0bfcfeccba1f5d51bf4648ddb89a03cb

    • Size

      204KB

    • MD5

      4ed8e6e0f4d0af5b78b92eced87f8e19

    • SHA1

      11efbc493c41204cf75859dfa082f1d1fb2dd427

    • SHA256

      8384f619c397d12b2965e919cb145a0d0bfcfeccba1f5d51bf4648ddb89a03cb

    • SHA512

      ed6f939495e02225e761699ef76eac99793792b22c22751c6e54278fcf615ec61698fda8eebab7374d300f9bfbb290a46a130cb0401a0325a588a2a3db3bf30a

    • SSDEEP

      3072:M6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:MZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks