General

  • Target

    JaffaCakes118_f992f077a06672d9137444f258de7f903e306e5abc0a605f1e26897b96b36968

  • Size

    157KB

  • Sample

    241230-2414mswkgy

  • MD5

    e2edc54cccdd55bfc57aa17737de0802

  • SHA1

    6acb63a05afadf19c40a4118fb3612155035f50d

  • SHA256

    f992f077a06672d9137444f258de7f903e306e5abc0a605f1e26897b96b36968

  • SHA512

    ec181f695fac8ff6f25a730ed94c56d487a0aa662c6c24210d6e9ebdae9e5340fb91003ebabfac73faf00fd4c0279ad3a7780c797e6f558a3aafa102f23540bd

  • SSDEEP

    3072:tXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:7MHNLvC1FoCGx//Xq

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f992f077a06672d9137444f258de7f903e306e5abc0a605f1e26897b96b36968

    • Size

      157KB

    • MD5

      e2edc54cccdd55bfc57aa17737de0802

    • SHA1

      6acb63a05afadf19c40a4118fb3612155035f50d

    • SHA256

      f992f077a06672d9137444f258de7f903e306e5abc0a605f1e26897b96b36968

    • SHA512

      ec181f695fac8ff6f25a730ed94c56d487a0aa662c6c24210d6e9ebdae9e5340fb91003ebabfac73faf00fd4c0279ad3a7780c797e6f558a3aafa102f23540bd

    • SSDEEP

      3072:tXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:7MHNLvC1FoCGx//Xq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks