General

  • Target

    JaffaCakes118_c5f5a9d23099fa1d24f59ed1f9049efbef3be6f3ea2924eb3053eb032e0f69ab

  • Size

    162KB

  • Sample

    241230-2ppr3asmal

  • MD5

    34fedf7c1ec8af59252ca4f656d0311a

  • SHA1

    9d52db1197d2bed8f3e0d3dfd751f839a8c04363

  • SHA256

    c5f5a9d23099fa1d24f59ed1f9049efbef3be6f3ea2924eb3053eb032e0f69ab

  • SHA512

    3e8a7cf8c98d0aaea8574b19af22ad4ca3aac87b5bd8ac2ebb20898aaeb7a1f7eaad2a4d6c62be104bad7b16848f7c2a5d8a3eaf4f0a8329f66c9e552cf997d5

  • SSDEEP

    3072:dmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:cLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c5f5a9d23099fa1d24f59ed1f9049efbef3be6f3ea2924eb3053eb032e0f69ab

    • Size

      162KB

    • MD5

      34fedf7c1ec8af59252ca4f656d0311a

    • SHA1

      9d52db1197d2bed8f3e0d3dfd751f839a8c04363

    • SHA256

      c5f5a9d23099fa1d24f59ed1f9049efbef3be6f3ea2924eb3053eb032e0f69ab

    • SHA512

      3e8a7cf8c98d0aaea8574b19af22ad4ca3aac87b5bd8ac2ebb20898aaeb7a1f7eaad2a4d6c62be104bad7b16848f7c2a5d8a3eaf4f0a8329f66c9e552cf997d5

    • SSDEEP

      3072:dmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:cLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks