General

  • Target

    JaffaCakes118_6fe44a8449514e1485bdb2955db95a2e12985d1cafaccd355cec3c03db50c74a

  • Size

    159KB

  • Sample

    241230-2vdxrasnfn

  • MD5

    bd518c5314ebcdc3218c5fae36e80a93

  • SHA1

    3797e7fcaddfa4c44e112211115f7c5854caaf96

  • SHA256

    6fe44a8449514e1485bdb2955db95a2e12985d1cafaccd355cec3c03db50c74a

  • SHA512

    ade2586a5ee1a1ef3044ec8fced45513a6440ab427b5ca176ae640874eef18a4e5c6a73523fa0458ccbf78e323bafc84d3a05fb2ff3f625a3b3b8990d34fa31c

  • SSDEEP

    3072:Ak8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYY+Zwd:QnClX8WZ7/HrRCADTR0VloZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6fe44a8449514e1485bdb2955db95a2e12985d1cafaccd355cec3c03db50c74a

    • Size

      159KB

    • MD5

      bd518c5314ebcdc3218c5fae36e80a93

    • SHA1

      3797e7fcaddfa4c44e112211115f7c5854caaf96

    • SHA256

      6fe44a8449514e1485bdb2955db95a2e12985d1cafaccd355cec3c03db50c74a

    • SHA512

      ade2586a5ee1a1ef3044ec8fced45513a6440ab427b5ca176ae640874eef18a4e5c6a73523fa0458ccbf78e323bafc84d3a05fb2ff3f625a3b3b8990d34fa31c

    • SSDEEP

      3072:Ak8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYY+Zwd:QnClX8WZ7/HrRCADTR0VloZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks