General

  • Target

    JaffaCakes118_d09863cc284de7cfcb592209476bee6d4c8c460ff35044d03697e024899c5913

  • Size

    204KB

  • Sample

    241230-fkmagsyncx

  • MD5

    88dcc167c57921248c751b60a3fce626

  • SHA1

    51e031260ff7301c722e38b572ed4141a2b1f60d

  • SHA256

    d09863cc284de7cfcb592209476bee6d4c8c460ff35044d03697e024899c5913

  • SHA512

    1051c967ca16024784c0a66ba5c33dd8c4d80fae949ef5fb3197b939aa0d4497ebfc28bd2880bf374483896aada26776e12e3bc8a2463c387eedd98d796d1490

  • SSDEEP

    3072:hBHfDmTQoHJhc+1aImpJRxSmR7bVsSazalcBfc7Ivu5IMlZ:hBHLSc+wLJRHFVsSaGluUs25Iw

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d09863cc284de7cfcb592209476bee6d4c8c460ff35044d03697e024899c5913

    • Size

      204KB

    • MD5

      88dcc167c57921248c751b60a3fce626

    • SHA1

      51e031260ff7301c722e38b572ed4141a2b1f60d

    • SHA256

      d09863cc284de7cfcb592209476bee6d4c8c460ff35044d03697e024899c5913

    • SHA512

      1051c967ca16024784c0a66ba5c33dd8c4d80fae949ef5fb3197b939aa0d4497ebfc28bd2880bf374483896aada26776e12e3bc8a2463c387eedd98d796d1490

    • SSDEEP

      3072:hBHfDmTQoHJhc+1aImpJRxSmR7bVsSazalcBfc7Ivu5IMlZ:hBHLSc+wLJRHFVsSaGluUs25Iw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks