General

  • Target

    JaffaCakes118_b1e0e71eb9e44fc35554fb048cc74f1ca06b7d864ec81f8c9995a81aebc73671

  • Size

    162KB

  • Sample

    241230-eb5j2axlay

  • MD5

    6ec878c7c2be720187aa70f45c710da5

  • SHA1

    6248946cd69e7533df4469526b9b63e71473fc6e

  • SHA256

    b1e0e71eb9e44fc35554fb048cc74f1ca06b7d864ec81f8c9995a81aebc73671

  • SHA512

    061fe31edf8f71fffd53bafb551a279c5c8ed8a52638a0abe7d333e3357299280a4fb51ce09df34e7d32003f03fb012c31a3c26b7376926e31e1e59af4be7b34

  • SSDEEP

    3072:fmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:+Lc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b1e0e71eb9e44fc35554fb048cc74f1ca06b7d864ec81f8c9995a81aebc73671

    • Size

      162KB

    • MD5

      6ec878c7c2be720187aa70f45c710da5

    • SHA1

      6248946cd69e7533df4469526b9b63e71473fc6e

    • SHA256

      b1e0e71eb9e44fc35554fb048cc74f1ca06b7d864ec81f8c9995a81aebc73671

    • SHA512

      061fe31edf8f71fffd53bafb551a279c5c8ed8a52638a0abe7d333e3357299280a4fb51ce09df34e7d32003f03fb012c31a3c26b7376926e31e1e59af4be7b34

    • SSDEEP

      3072:fmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:+Lc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks