General

  • Target

    JaffaCakes118_687f4be161752b14d4708f202b42b7feafdc2255a3cf805c2f4c4d9aed615d6d

  • Size

    160KB

  • Sample

    241230-gn7k9szpgr

  • MD5

    6868d549c3cca7978bd769415f685ece

  • SHA1

    9d0294afcf6ea43b0de0bbab43446ecdaab65d0a

  • SHA256

    687f4be161752b14d4708f202b42b7feafdc2255a3cf805c2f4c4d9aed615d6d

  • SHA512

    6823182c2a262a361e10b3907efd88b9ba0f1a7daa73a42e2403f78b45c77f69e90097fd6f3a8a66480fd6d108bdf6d6b7f4ba54659bbb2deeafc2c9ef6796af

  • SSDEEP

    3072:LnnT2d85tleLD51fC5AHYEoefukoTFMpGmjh8D:Lqy5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_687f4be161752b14d4708f202b42b7feafdc2255a3cf805c2f4c4d9aed615d6d

    • Size

      160KB

    • MD5

      6868d549c3cca7978bd769415f685ece

    • SHA1

      9d0294afcf6ea43b0de0bbab43446ecdaab65d0a

    • SHA256

      687f4be161752b14d4708f202b42b7feafdc2255a3cf805c2f4c4d9aed615d6d

    • SHA512

      6823182c2a262a361e10b3907efd88b9ba0f1a7daa73a42e2403f78b45c77f69e90097fd6f3a8a66480fd6d108bdf6d6b7f4ba54659bbb2deeafc2c9ef6796af

    • SSDEEP

      3072:LnnT2d85tleLD51fC5AHYEoefukoTFMpGmjh8D:Lqy5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks