General

  • Target

    JaffaCakes118_9c223ad3823202813a82801aedc85a39cebf049395882c4a3c594d2b02e5dd23

  • Size

    162KB

  • Sample

    241230-1xdjbs1jel

  • MD5

    8f196350551a8e6aaf540b50fea4a73b

  • SHA1

    d8bf43df8f0d50b05fd521deaf3cf99bade2d2e9

  • SHA256

    9c223ad3823202813a82801aedc85a39cebf049395882c4a3c594d2b02e5dd23

  • SHA512

    d98a7bcd84a845dd16c32e47bb00fd8d368d8026b4d845061ff9440d676cf4f6aed6c657f9a7fb9941f98108e6e06d57767dc02fa16fc566881d03e872d3cf5a

  • SSDEEP

    3072:imNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:zLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9c223ad3823202813a82801aedc85a39cebf049395882c4a3c594d2b02e5dd23

    • Size

      162KB

    • MD5

      8f196350551a8e6aaf540b50fea4a73b

    • SHA1

      d8bf43df8f0d50b05fd521deaf3cf99bade2d2e9

    • SHA256

      9c223ad3823202813a82801aedc85a39cebf049395882c4a3c594d2b02e5dd23

    • SHA512

      d98a7bcd84a845dd16c32e47bb00fd8d368d8026b4d845061ff9440d676cf4f6aed6c657f9a7fb9941f98108e6e06d57767dc02fa16fc566881d03e872d3cf5a

    • SSDEEP

      3072:imNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:zLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks