General

  • Target

    JaffaCakes118_79e74b2ec617f27dcb58e35b2ce7ac3f83040a07eb29ac9e92d838461bddc726

  • Size

    204KB

  • Sample

    241230-fv7deayqhn

  • MD5

    643be4b51edec4ea6962aef75b66e8c3

  • SHA1

    b9c499fbd0f2635a2492baed6dc8de487bc32e99

  • SHA256

    79e74b2ec617f27dcb58e35b2ce7ac3f83040a07eb29ac9e92d838461bddc726

  • SHA512

    bb0897c3c081e1f1aaa21999b810956d63f2ae7384d9c6eb4f6231a805135ce1144280e32ffe4466bfe33d5920c0f91ef80b67ec63d30e880a810278ce9eb956

  • SSDEEP

    3072:+6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:+ZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_79e74b2ec617f27dcb58e35b2ce7ac3f83040a07eb29ac9e92d838461bddc726

    • Size

      204KB

    • MD5

      643be4b51edec4ea6962aef75b66e8c3

    • SHA1

      b9c499fbd0f2635a2492baed6dc8de487bc32e99

    • SHA256

      79e74b2ec617f27dcb58e35b2ce7ac3f83040a07eb29ac9e92d838461bddc726

    • SHA512

      bb0897c3c081e1f1aaa21999b810956d63f2ae7384d9c6eb4f6231a805135ce1144280e32ffe4466bfe33d5920c0f91ef80b67ec63d30e880a810278ce9eb956

    • SSDEEP

      3072:+6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:+ZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks