General

  • Target

    JaffaCakes118_513bd8c9dc79445ee24a87212168d38f76b066f47da06d2c8ff82817b85e97ed

  • Size

    204KB

  • Sample

    241230-d7xzdsxjgv

  • MD5

    61ab62d1687aa0b17513d56ee6cf0589

  • SHA1

    9d83cf5fe7c8a6e554db8dde207ed08e27a5e26b

  • SHA256

    513bd8c9dc79445ee24a87212168d38f76b066f47da06d2c8ff82817b85e97ed

  • SHA512

    f58dc6ed5b18e5b7e11b4e2713c69aac7b2269fa00ff5f8409394d908e91e7ee6edbbacd5bed7a4a118382932771eda9c3ab6111b0504495ec1c9b1b190d2377

  • SSDEEP

    3072:m6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:mZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_513bd8c9dc79445ee24a87212168d38f76b066f47da06d2c8ff82817b85e97ed

    • Size

      204KB

    • MD5

      61ab62d1687aa0b17513d56ee6cf0589

    • SHA1

      9d83cf5fe7c8a6e554db8dde207ed08e27a5e26b

    • SHA256

      513bd8c9dc79445ee24a87212168d38f76b066f47da06d2c8ff82817b85e97ed

    • SHA512

      f58dc6ed5b18e5b7e11b4e2713c69aac7b2269fa00ff5f8409394d908e91e7ee6edbbacd5bed7a4a118382932771eda9c3ab6111b0504495ec1c9b1b190d2377

    • SSDEEP

      3072:m6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:mZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks