General

  • Target

    JaffaCakes118_fd323688325a4fd77706d39274bee8a5ecceb637822e592ce4d6f7b8bed640d0

  • Size

    159KB

  • Sample

    241230-24sghasrgl

  • MD5

    518bbba2311e1328a1f877cfce9bdd86

  • SHA1

    fb5690e3ad126532c0332b0d740427623074ba17

  • SHA256

    fd323688325a4fd77706d39274bee8a5ecceb637822e592ce4d6f7b8bed640d0

  • SHA512

    4dfccf832a6f424c282b05f351476b8a5b3878256c5bc8ecfc5d3498c6e110359e68b0dbdc0bb7088a1a95b99133bfd50969d01a1cfb4b5003b61ee8383b05d9

  • SSDEEP

    3072:Nm8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYbZwd:fnClX8WZ7/HrRCADTR0VlpZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fd323688325a4fd77706d39274bee8a5ecceb637822e592ce4d6f7b8bed640d0

    • Size

      159KB

    • MD5

      518bbba2311e1328a1f877cfce9bdd86

    • SHA1

      fb5690e3ad126532c0332b0d740427623074ba17

    • SHA256

      fd323688325a4fd77706d39274bee8a5ecceb637822e592ce4d6f7b8bed640d0

    • SHA512

      4dfccf832a6f424c282b05f351476b8a5b3878256c5bc8ecfc5d3498c6e110359e68b0dbdc0bb7088a1a95b99133bfd50969d01a1cfb4b5003b61ee8383b05d9

    • SSDEEP

      3072:Nm8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYbZwd:fnClX8WZ7/HrRCADTR0VlpZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks