General

  • Target

    JaffaCakes118_7245bf1df1beb7774cf88ab9f451037093a409a472ac191a69d58e868b1d89a0

  • Size

    157KB

  • Sample

    241230-ey1vcsxrax

  • MD5

    0cbcc86c9b1007ce745575aa8f38e792

  • SHA1

    242ee111306ac4e180b9bb60f7188af70f5fd72c

  • SHA256

    7245bf1df1beb7774cf88ab9f451037093a409a472ac191a69d58e868b1d89a0

  • SHA512

    8667d029c2ca64adf3ae9b5b543e8e35113dbfcd639137a92c232299d8af9d4b0521796d1e0d292f483bdc44fa7da5bfcc6671eb88e57d187f6844eba77f5cac

  • SSDEEP

    3072:AXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:YMHNLvC1FoCGx//Xq

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7245bf1df1beb7774cf88ab9f451037093a409a472ac191a69d58e868b1d89a0

    • Size

      157KB

    • MD5

      0cbcc86c9b1007ce745575aa8f38e792

    • SHA1

      242ee111306ac4e180b9bb60f7188af70f5fd72c

    • SHA256

      7245bf1df1beb7774cf88ab9f451037093a409a472ac191a69d58e868b1d89a0

    • SHA512

      8667d029c2ca64adf3ae9b5b543e8e35113dbfcd639137a92c232299d8af9d4b0521796d1e0d292f483bdc44fa7da5bfcc6671eb88e57d187f6844eba77f5cac

    • SSDEEP

      3072:AXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:YMHNLvC1FoCGx//Xq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks