General

  • Target

    JaffaCakes118_90c7ad76b86852feb1722e60430ec6637d567756240345223526d015071022d2

  • Size

    204KB

  • Sample

    241230-1ygblstmbz

  • MD5

    792510ee5e3e179e8ea634f6cc20b1ef

  • SHA1

    48efc998d1d4127a94ea02d218f08533515d9edb

  • SHA256

    90c7ad76b86852feb1722e60430ec6637d567756240345223526d015071022d2

  • SHA512

    6cf53beca48c00dd8e39dbca117c47a93122672f949b75e30ac2a585275106e850ddd53b4c93cab68f7aac8779ac6749da12acc6e0254fdf0908a1aa619e84f5

  • SSDEEP

    3072:56FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:5ZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
1
UVIabEjB7cX6jVKokUQcey9IpyGEGPkvqXISjMkvOrRdeF
rc4.plain
1
A7nJdD3IzXdgiaHV1DVykZf4vgLdgyv3BjvHZxN0p1c96yC1jyzioBieIa2M

Targets

    • Target

      JaffaCakes118_90c7ad76b86852feb1722e60430ec6637d567756240345223526d015071022d2

    • Size

      204KB

    • MD5

      792510ee5e3e179e8ea634f6cc20b1ef

    • SHA1

      48efc998d1d4127a94ea02d218f08533515d9edb

    • SHA256

      90c7ad76b86852feb1722e60430ec6637d567756240345223526d015071022d2

    • SHA512

      6cf53beca48c00dd8e39dbca117c47a93122672f949b75e30ac2a585275106e850ddd53b4c93cab68f7aac8779ac6749da12acc6e0254fdf0908a1aa619e84f5

    • SSDEEP

      3072:56FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:5ZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.