General

  • Target

    JaffaCakes118_7d8ec2c51d0f172562aed7dfc1dfb48980c1fdc6fc4161424c4819cf4979a179

  • Size

    159KB

  • Sample

    241230-vsrmhatjcw

  • MD5

    9cee98b70ca8ec2378fc31d7cf4e83c2

  • SHA1

    e7b4e5a0a4cd630d08008f13fb0f1e5ed327e59e

  • SHA256

    7d8ec2c51d0f172562aed7dfc1dfb48980c1fdc6fc4161424c4819cf4979a179

  • SHA512

    9f74a13f9eab4810a30f5dd3231c213b9a0bf07811f7a53472c9da1691ffa9751896efa53f1b865eb0a849afca68201be831d1d66486a014c7bd24ac47ae1a8a

  • SSDEEP

    3072:X58CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYbZwd:6nClX8WZ7/HrRCADTR0VlJZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7d8ec2c51d0f172562aed7dfc1dfb48980c1fdc6fc4161424c4819cf4979a179

    • Size

      159KB

    • MD5

      9cee98b70ca8ec2378fc31d7cf4e83c2

    • SHA1

      e7b4e5a0a4cd630d08008f13fb0f1e5ed327e59e

    • SHA256

      7d8ec2c51d0f172562aed7dfc1dfb48980c1fdc6fc4161424c4819cf4979a179

    • SHA512

      9f74a13f9eab4810a30f5dd3231c213b9a0bf07811f7a53472c9da1691ffa9751896efa53f1b865eb0a849afca68201be831d1d66486a014c7bd24ac47ae1a8a

    • SSDEEP

      3072:X58CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYbZwd:6nClX8WZ7/HrRCADTR0VlJZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks