General

  • Target

    JaffaCakes118_27b72052170e07237cfb09a906ec1a3c26c5f20988097709b00d3f6c9b45ff2d

  • Size

    204KB

  • Sample

    241230-gtd6xazrav

  • MD5

    36c81b6c0c362897e68f8e0d46b18a1e

  • SHA1

    e838fd9cd1656dad424a8e205d931cdaaa32ade7

  • SHA256

    27b72052170e07237cfb09a906ec1a3c26c5f20988097709b00d3f6c9b45ff2d

  • SHA512

    c7016793a4a72f76a3cc5e384c02c5c3e9b4251125faa55eec62671768a7d69318fbe629841035a6e7d29dd94cbdb64f98ed2eac5edd1dc67b8a9476e82a51fd

  • SSDEEP

    3072:Z6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:ZZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_27b72052170e07237cfb09a906ec1a3c26c5f20988097709b00d3f6c9b45ff2d

    • Size

      204KB

    • MD5

      36c81b6c0c362897e68f8e0d46b18a1e

    • SHA1

      e838fd9cd1656dad424a8e205d931cdaaa32ade7

    • SHA256

      27b72052170e07237cfb09a906ec1a3c26c5f20988097709b00d3f6c9b45ff2d

    • SHA512

      c7016793a4a72f76a3cc5e384c02c5c3e9b4251125faa55eec62671768a7d69318fbe629841035a6e7d29dd94cbdb64f98ed2eac5edd1dc67b8a9476e82a51fd

    • SSDEEP

      3072:Z6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:ZZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks