General

  • Target

    JaffaCakes118_8e7f14c1e7546ef363e9f4487abc1720b730e84e78dfa7765fcd525c47796f2e

  • Size

    204KB

  • Sample

    241230-1wk7sa1jbk

  • MD5

    e814c208fcb2bf03f6e858cf146b4c7c

  • SHA1

    39aa1101f040e6fcc0722335bc8662c2f2ebcf43

  • SHA256

    8e7f14c1e7546ef363e9f4487abc1720b730e84e78dfa7765fcd525c47796f2e

  • SHA512

    3fb1c2bb39290edb843aff45d573a8d3bd9d24ff59d02e5547cb99b543d4cb7fd074357be219f4b558e5e8b1db02666cdbafc79380a950df751ab2d2d4195064

  • SSDEEP

    3072:r6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:rZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8e7f14c1e7546ef363e9f4487abc1720b730e84e78dfa7765fcd525c47796f2e

    • Size

      204KB

    • MD5

      e814c208fcb2bf03f6e858cf146b4c7c

    • SHA1

      39aa1101f040e6fcc0722335bc8662c2f2ebcf43

    • SHA256

      8e7f14c1e7546ef363e9f4487abc1720b730e84e78dfa7765fcd525c47796f2e

    • SHA512

      3fb1c2bb39290edb843aff45d573a8d3bd9d24ff59d02e5547cb99b543d4cb7fd074357be219f4b558e5e8b1db02666cdbafc79380a950df751ab2d2d4195064

    • SSDEEP

      3072:r6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:rZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks