General

  • Target

    JaffaCakes118_1888f1ca79ae9a816d819aad994b7f77d0829a3846a806202ca030b8d8536c34

  • Size

    204KB

  • Sample

    241230-2askea1pgq

  • MD5

    8efc0941a31955641a9007c9584f8880

  • SHA1

    23a0cb7e40929ce7b0874b6f9ad52211e536fef9

  • SHA256

    1888f1ca79ae9a816d819aad994b7f77d0829a3846a806202ca030b8d8536c34

  • SHA512

    da8a3ca381a50a80818599234f65cbc5f750da76eb6c9c44e55999b6fecb63d735dd5069bebebb1f8626dee77145b2b48ab67f8b3181f2e0ec66a3be94b40657

  • SSDEEP

    3072:K6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:KZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1888f1ca79ae9a816d819aad994b7f77d0829a3846a806202ca030b8d8536c34

    • Size

      204KB

    • MD5

      8efc0941a31955641a9007c9584f8880

    • SHA1

      23a0cb7e40929ce7b0874b6f9ad52211e536fef9

    • SHA256

      1888f1ca79ae9a816d819aad994b7f77d0829a3846a806202ca030b8d8536c34

    • SHA512

      da8a3ca381a50a80818599234f65cbc5f750da76eb6c9c44e55999b6fecb63d735dd5069bebebb1f8626dee77145b2b48ab67f8b3181f2e0ec66a3be94b40657

    • SSDEEP

      3072:K6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:KZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks