General

  • Target

    JaffaCakes118_65f140ec148defdf92a8387a996ee12ad7bc23ccd393a28689f74e604c8a5238

  • Size

    204KB

  • Sample

    241230-3hrhrawras

  • MD5

    2399fbe8d15bc5ac102a309dd8dc5db7

  • SHA1

    68843a2ef54bd85a36efba3c84305c7c6e542304

  • SHA256

    65f140ec148defdf92a8387a996ee12ad7bc23ccd393a28689f74e604c8a5238

  • SHA512

    40990193c36761d804e22d6f1881a81ff946917176d295c04a7ba8d3e5f12f8b76a34afa8be1d24f572d0edfa4c0c1b2cf02ab441eadad09be54abb6cbeea4ee

  • SSDEEP

    3072:S6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:SZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_65f140ec148defdf92a8387a996ee12ad7bc23ccd393a28689f74e604c8a5238

    • Size

      204KB

    • MD5

      2399fbe8d15bc5ac102a309dd8dc5db7

    • SHA1

      68843a2ef54bd85a36efba3c84305c7c6e542304

    • SHA256

      65f140ec148defdf92a8387a996ee12ad7bc23ccd393a28689f74e604c8a5238

    • SHA512

      40990193c36761d804e22d6f1881a81ff946917176d295c04a7ba8d3e5f12f8b76a34afa8be1d24f572d0edfa4c0c1b2cf02ab441eadad09be54abb6cbeea4ee

    • SSDEEP

      3072:S6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:SZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks