General

  • Target

    JaffaCakes118_66d743c3d4827f2264ee8c03eb4e5bcd7afe7a91a114067043277dda3d7ad011

  • Size

    204KB

  • Sample

    241230-vqha2ssrew

  • MD5

    b543208a0f1af2b3d43954664badd601

  • SHA1

    42a568cfaa744cc19c2243a4f13cc9f876131747

  • SHA256

    66d743c3d4827f2264ee8c03eb4e5bcd7afe7a91a114067043277dda3d7ad011

  • SHA512

    25841e245f194301a22b6e122f1ae21394d7f3810937e0c6297b66116f728e3def7dc5ce0b2ab9eb8f57a6533d7e9cb35905133dccc77d297f4ed8617c3b6fa3

  • SSDEEP

    3072:M6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:MZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_66d743c3d4827f2264ee8c03eb4e5bcd7afe7a91a114067043277dda3d7ad011

    • Size

      204KB

    • MD5

      b543208a0f1af2b3d43954664badd601

    • SHA1

      42a568cfaa744cc19c2243a4f13cc9f876131747

    • SHA256

      66d743c3d4827f2264ee8c03eb4e5bcd7afe7a91a114067043277dda3d7ad011

    • SHA512

      25841e245f194301a22b6e122f1ae21394d7f3810937e0c6297b66116f728e3def7dc5ce0b2ab9eb8f57a6533d7e9cb35905133dccc77d297f4ed8617c3b6fa3

    • SSDEEP

      3072:M6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:MZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks