General

  • Target

    JaffaCakes118_a96f41bbed7f502e9a2b1c9ee483bee50a6e6ee154cf650c5b4067c24b4c74c6

  • Size

    154KB

  • Sample

    241230-fpwpqaypgn

  • MD5

    d74eb0afc72c247de611c70c2718696a

  • SHA1

    ee2b64c9040ba064a49ee9db69b7bb72c7cb2571

  • SHA256

    a96f41bbed7f502e9a2b1c9ee483bee50a6e6ee154cf650c5b4067c24b4c74c6

  • SHA512

    48a090a8dc7a88c08f90d4f3279d873d571ac3ab47ef2de5ae5b969ac4dae0321c72d43ab41b07281a56f21cd67d0e69d86a0ab00b261215f4b47397f127f9b4

  • SSDEEP

    3072:lZ+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBC:0QeVf/2gUU76rDeIgESXZmYYa

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a96f41bbed7f502e9a2b1c9ee483bee50a6e6ee154cf650c5b4067c24b4c74c6

    • Size

      154KB

    • MD5

      d74eb0afc72c247de611c70c2718696a

    • SHA1

      ee2b64c9040ba064a49ee9db69b7bb72c7cb2571

    • SHA256

      a96f41bbed7f502e9a2b1c9ee483bee50a6e6ee154cf650c5b4067c24b4c74c6

    • SHA512

      48a090a8dc7a88c08f90d4f3279d873d571ac3ab47ef2de5ae5b969ac4dae0321c72d43ab41b07281a56f21cd67d0e69d86a0ab00b261215f4b47397f127f9b4

    • SSDEEP

      3072:lZ+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBC:0QeVf/2gUU76rDeIgESXZmYYa

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks