General

  • Target

    JaffaCakes118_a6580d13fbbbdc2359058ee7c9e87226be47103f1a3ca87640ddb7209b57a7ee

  • Size

    204KB

  • Sample

    241230-w1m5qavphy

  • MD5

    f1ee25b04f0983e5fa06c49cafd8daa4

  • SHA1

    28ccd1d50b01495a1ba76eb0ff4295c59d14bbee

  • SHA256

    a6580d13fbbbdc2359058ee7c9e87226be47103f1a3ca87640ddb7209b57a7ee

  • SHA512

    7eb3a8bb3e62e400a4f1efdae2bea31e52262fc7cf56328fa0cc2eb5d4ea400e92c340d3924a2a5b631e3c7db06e6a80114617bc189eb18c11741ccb59b288e7

  • SSDEEP

    3072:e6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:eZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a6580d13fbbbdc2359058ee7c9e87226be47103f1a3ca87640ddb7209b57a7ee

    • Size

      204KB

    • MD5

      f1ee25b04f0983e5fa06c49cafd8daa4

    • SHA1

      28ccd1d50b01495a1ba76eb0ff4295c59d14bbee

    • SHA256

      a6580d13fbbbdc2359058ee7c9e87226be47103f1a3ca87640ddb7209b57a7ee

    • SHA512

      7eb3a8bb3e62e400a4f1efdae2bea31e52262fc7cf56328fa0cc2eb5d4ea400e92c340d3924a2a5b631e3c7db06e6a80114617bc189eb18c11741ccb59b288e7

    • SSDEEP

      3072:e6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:eZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks