General

  • Target

    JaffaCakes118_80a83f3377163d0765e7584d081b22ee66590829b18075a969b8542546af7963

  • Size

    204KB

  • Sample

    241230-2vrtlssngr

  • MD5

    76014d7d4c01273ec47ce86b0a01d500

  • SHA1

    8372ee8f7d2c80aaaf018bfca2811964d22bb77d

  • SHA256

    80a83f3377163d0765e7584d081b22ee66590829b18075a969b8542546af7963

  • SHA512

    f04f6a2945c6309586c04b18e2bacfbe1bd19ff4df9006de64592428fdae2ac81281106f79077160c7d27c551396c4d5b81be06848310ff95ffb1db4f801a1da

  • SSDEEP

    3072:A6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:AZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_80a83f3377163d0765e7584d081b22ee66590829b18075a969b8542546af7963

    • Size

      204KB

    • MD5

      76014d7d4c01273ec47ce86b0a01d500

    • SHA1

      8372ee8f7d2c80aaaf018bfca2811964d22bb77d

    • SHA256

      80a83f3377163d0765e7584d081b22ee66590829b18075a969b8542546af7963

    • SHA512

      f04f6a2945c6309586c04b18e2bacfbe1bd19ff4df9006de64592428fdae2ac81281106f79077160c7d27c551396c4d5b81be06848310ff95ffb1db4f801a1da

    • SSDEEP

      3072:A6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:AZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks