General

  • Target

    JaffaCakes118_cfa724aa1707491358293143fc01784a4b84d7af0653072aee74f93a135445ec

  • Size

    204KB

  • Sample

    241230-vvc7ws1jhq

  • MD5

    188de406ca0ce54348e648e5ee637df7

  • SHA1

    47eb11c214c7ae3b63ad3ead6ce77dc361ffc452

  • SHA256

    cfa724aa1707491358293143fc01784a4b84d7af0653072aee74f93a135445ec

  • SHA512

    1f51cf32e6d8cb6834e0bf8d9bd6d45abb8266823bb375632e28038dbd71b1a1db5a23994cd1398017ef40ad14ebaef82dba1462f1d86621eb3fd5f200e43af4

  • SSDEEP

    3072:/6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:/ZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cfa724aa1707491358293143fc01784a4b84d7af0653072aee74f93a135445ec

    • Size

      204KB

    • MD5

      188de406ca0ce54348e648e5ee637df7

    • SHA1

      47eb11c214c7ae3b63ad3ead6ce77dc361ffc452

    • SHA256

      cfa724aa1707491358293143fc01784a4b84d7af0653072aee74f93a135445ec

    • SHA512

      1f51cf32e6d8cb6834e0bf8d9bd6d45abb8266823bb375632e28038dbd71b1a1db5a23994cd1398017ef40ad14ebaef82dba1462f1d86621eb3fd5f200e43af4

    • SSDEEP

      3072:/6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:/ZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks