General

  • Target

    JaffaCakes118_e38b6bc4f56b6c8c08d2d633db195f78052644c7ef758e40f639f3bdaa8e4af9

  • Size

    204KB

  • Sample

    241230-vy8szatlav

  • MD5

    963723665a2dc65f8b65900ce4df4438

  • SHA1

    e0d496f0e158333ec972db763015c77871723368

  • SHA256

    e38b6bc4f56b6c8c08d2d633db195f78052644c7ef758e40f639f3bdaa8e4af9

  • SHA512

    2bfecf9c706d7878442cb3a3498a8a180bd213000c151ca00c027431dd471dc4dc4ae9d133ca8184e7cae5192a52488d2b577a4b1044ca947da72318840a5a8d

  • SSDEEP

    3072:Z6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:ZZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e38b6bc4f56b6c8c08d2d633db195f78052644c7ef758e40f639f3bdaa8e4af9

    • Size

      204KB

    • MD5

      963723665a2dc65f8b65900ce4df4438

    • SHA1

      e0d496f0e158333ec972db763015c77871723368

    • SHA256

      e38b6bc4f56b6c8c08d2d633db195f78052644c7ef758e40f639f3bdaa8e4af9

    • SHA512

      2bfecf9c706d7878442cb3a3498a8a180bd213000c151ca00c027431dd471dc4dc4ae9d133ca8184e7cae5192a52488d2b577a4b1044ca947da72318840a5a8d

    • SSDEEP

      3072:Z6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:ZZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks