General

  • Target

    JaffaCakes118_2748bef73aa6cee766808059559a8580b56dffb7868520bdf9ff2adfbabe2829

  • Size

    204KB

  • Sample

    241230-fqpykayqak

  • MD5

    303bfad8af55d0bcc02ff4c099b13373

  • SHA1

    3ce8f588dc42e07e7b62ce7050ae1a84ecf452f0

  • SHA256

    2748bef73aa6cee766808059559a8580b56dffb7868520bdf9ff2adfbabe2829

  • SHA512

    d7d069f04222348a743a330f5040ee67661357aa33d27c3a89eb732b4094fab53efb3ac3f6aa37ed78ed79d2d9f4d0d1289a847203a805653acc0ef8695e9808

  • SSDEEP

    3072:k6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:kZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2748bef73aa6cee766808059559a8580b56dffb7868520bdf9ff2adfbabe2829

    • Size

      204KB

    • MD5

      303bfad8af55d0bcc02ff4c099b13373

    • SHA1

      3ce8f588dc42e07e7b62ce7050ae1a84ecf452f0

    • SHA256

      2748bef73aa6cee766808059559a8580b56dffb7868520bdf9ff2adfbabe2829

    • SHA512

      d7d069f04222348a743a330f5040ee67661357aa33d27c3a89eb732b4094fab53efb3ac3f6aa37ed78ed79d2d9f4d0d1289a847203a805653acc0ef8695e9808

    • SSDEEP

      3072:k6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:kZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks