General

  • Target

    JaffaCakes118_ed96666116a22423914a04af4a26caeb943760b46dac8d4a04df910fff0a1c99

  • Size

    160KB

  • Sample

    241230-2kz28sskfj

  • MD5

    a849cca1152e0e1b10dd2937ff316d8d

  • SHA1

    b3cd371318a8b2eeeecb35f76ae50382b130bf42

  • SHA256

    ed96666116a22423914a04af4a26caeb943760b46dac8d4a04df910fff0a1c99

  • SHA512

    45ecf8c34247fe282e2a348bd5f25552be20662beb807123be0d54f4adba3542abd113e102d58534392d2af58438a3fce21c15f8771d6917862553634761a938

  • SSDEEP

    3072:cxT2d85tleLD51fC5AHYEoefukoTFMpGmjY8D:Ny5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ed96666116a22423914a04af4a26caeb943760b46dac8d4a04df910fff0a1c99

    • Size

      160KB

    • MD5

      a849cca1152e0e1b10dd2937ff316d8d

    • SHA1

      b3cd371318a8b2eeeecb35f76ae50382b130bf42

    • SHA256

      ed96666116a22423914a04af4a26caeb943760b46dac8d4a04df910fff0a1c99

    • SHA512

      45ecf8c34247fe282e2a348bd5f25552be20662beb807123be0d54f4adba3542abd113e102d58534392d2af58438a3fce21c15f8771d6917862553634761a938

    • SSDEEP

      3072:cxT2d85tleLD51fC5AHYEoefukoTFMpGmjY8D:Ny5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks