General

  • Target

    JaffaCakes118_11dd2e76043e117871d45e89f301318b9d77eb0928e540eeeca3a5b4cbcf5122

  • Size

    204KB

  • Sample

    241230-vsgsastjbw

  • MD5

    3873b7db610b0735f310c80573dad731

  • SHA1

    cd531f629f58328a6ada55e194f7de92078476c4

  • SHA256

    11dd2e76043e117871d45e89f301318b9d77eb0928e540eeeca3a5b4cbcf5122

  • SHA512

    b923e0babccdc865181cfaca20d1183ca6db04ab48901f721546e2b4f7e3491879e6f0a696535e0106e2290521aec57f851b7b9e1abc8b6d7785c97d7f1b1949

  • SSDEEP

    3072:F6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:FZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_11dd2e76043e117871d45e89f301318b9d77eb0928e540eeeca3a5b4cbcf5122

    • Size

      204KB

    • MD5

      3873b7db610b0735f310c80573dad731

    • SHA1

      cd531f629f58328a6ada55e194f7de92078476c4

    • SHA256

      11dd2e76043e117871d45e89f301318b9d77eb0928e540eeeca3a5b4cbcf5122

    • SHA512

      b923e0babccdc865181cfaca20d1183ca6db04ab48901f721546e2b4f7e3491879e6f0a696535e0106e2290521aec57f851b7b9e1abc8b6d7785c97d7f1b1949

    • SSDEEP

      3072:F6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:FZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks