General

  • Target

    JaffaCakes118_d251aa64dcf4b415a22e54edef9c6e432cf9c9ffa8cac3e1c9cfbbebe4080fa4

  • Size

    204KB

  • Sample

    241230-w7zgbswjbs

  • MD5

    c56bf313829794bcbb354b0b496392a9

  • SHA1

    000df298a7641179aecd1c550474fce906ae614c

  • SHA256

    d251aa64dcf4b415a22e54edef9c6e432cf9c9ffa8cac3e1c9cfbbebe4080fa4

  • SHA512

    7c53a27c67daef533b6f296eb3d3a6c8ce90862cf2fdd39b80d80cfb0b7da7609c89342afaa849f6ac4b1f46fce4b18b2051f5354b22b93de0b18c30b759a68c

  • SSDEEP

    3072:86FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:8ZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d251aa64dcf4b415a22e54edef9c6e432cf9c9ffa8cac3e1c9cfbbebe4080fa4

    • Size

      204KB

    • MD5

      c56bf313829794bcbb354b0b496392a9

    • SHA1

      000df298a7641179aecd1c550474fce906ae614c

    • SHA256

      d251aa64dcf4b415a22e54edef9c6e432cf9c9ffa8cac3e1c9cfbbebe4080fa4

    • SHA512

      7c53a27c67daef533b6f296eb3d3a6c8ce90862cf2fdd39b80d80cfb0b7da7609c89342afaa849f6ac4b1f46fce4b18b2051f5354b22b93de0b18c30b759a68c

    • SSDEEP

      3072:86FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:8ZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks