General

  • Target

    JaffaCakes118_129885a7c8cedf434134105286fcf735762ffba3efbc9ec312e903ffbbea3333

  • Size

    204KB

  • Sample

    241230-2yxt2aspgp

  • MD5

    ebdd5fb51ee96ebcbd5079759c12ec53

  • SHA1

    883df3fb77fbbfe9c680e8073bbd392f3e648e20

  • SHA256

    129885a7c8cedf434134105286fcf735762ffba3efbc9ec312e903ffbbea3333

  • SHA512

    54a78559bad2cb3ebf423882af11235feb097be1fff7f2754ddc20f11ad170145d0f589c87b4a73abd271295913f0c4cdd2c7706607d25e03c00a364a4d0b3e1

  • SSDEEP

    3072:Z6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:ZZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_129885a7c8cedf434134105286fcf735762ffba3efbc9ec312e903ffbbea3333

    • Size

      204KB

    • MD5

      ebdd5fb51ee96ebcbd5079759c12ec53

    • SHA1

      883df3fb77fbbfe9c680e8073bbd392f3e648e20

    • SHA256

      129885a7c8cedf434134105286fcf735762ffba3efbc9ec312e903ffbbea3333

    • SHA512

      54a78559bad2cb3ebf423882af11235feb097be1fff7f2754ddc20f11ad170145d0f589c87b4a73abd271295913f0c4cdd2c7706607d25e03c00a364a4d0b3e1

    • SSDEEP

      3072:Z6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:ZZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks