General

  • Target

    JaffaCakes118_411b3046c8fed7a89b025cb5f6b00aaee5425e03c179df75dc2b690605606818

  • Size

    204KB

  • Sample

    241230-vskh7a1jdl

  • MD5

    a4333b50d5f1d14f5047da9c0c66b5a2

  • SHA1

    b42cb5412770ad8525727eb156ec9fe416153630

  • SHA256

    411b3046c8fed7a89b025cb5f6b00aaee5425e03c179df75dc2b690605606818

  • SHA512

    35d90de9ff0f7feb9feedca960c852a00b2a9ec9f7933cb49b1d2a22c46b7ff190653b46f01b601dfee0061de798634b877a2830edfd15425afdbdde19b9fbf9

  • SSDEEP

    3072:i6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:iZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_411b3046c8fed7a89b025cb5f6b00aaee5425e03c179df75dc2b690605606818

    • Size

      204KB

    • MD5

      a4333b50d5f1d14f5047da9c0c66b5a2

    • SHA1

      b42cb5412770ad8525727eb156ec9fe416153630

    • SHA256

      411b3046c8fed7a89b025cb5f6b00aaee5425e03c179df75dc2b690605606818

    • SHA512

      35d90de9ff0f7feb9feedca960c852a00b2a9ec9f7933cb49b1d2a22c46b7ff190653b46f01b601dfee0061de798634b877a2830edfd15425afdbdde19b9fbf9

    • SSDEEP

      3072:i6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:iZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks