General

  • Target

    JaffaCakes118_65b238ba099537104b06d653cbd2b2893caf1cd6e06a3afeeb9f348b6d6317f5

  • Size

    162KB

  • Sample

    241230-3ewnastmfq

  • MD5

    d22a6c68958ef258e89938ad7951dbc1

  • SHA1

    0a2868dbe1509f8db28f8168338a74ea4a91daa2

  • SHA256

    65b238ba099537104b06d653cbd2b2893caf1cd6e06a3afeeb9f348b6d6317f5

  • SHA512

    472298f537867f86ac1e1741c72691bf471579aa2a0e8e25c37cf80766c323b2e87cee55538fe698e54e8667a439c1d02320e20273938f936c601807f402e165

  • SSDEEP

    3072:gPmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:gOLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_65b238ba099537104b06d653cbd2b2893caf1cd6e06a3afeeb9f348b6d6317f5

    • Size

      162KB

    • MD5

      d22a6c68958ef258e89938ad7951dbc1

    • SHA1

      0a2868dbe1509f8db28f8168338a74ea4a91daa2

    • SHA256

      65b238ba099537104b06d653cbd2b2893caf1cd6e06a3afeeb9f348b6d6317f5

    • SHA512

      472298f537867f86ac1e1741c72691bf471579aa2a0e8e25c37cf80766c323b2e87cee55538fe698e54e8667a439c1d02320e20273938f936c601807f402e165

    • SSDEEP

      3072:gPmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:gOLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks