General

  • Target

    JaffaCakes118_6d3e54dec8421488131aacc3dbc7177fe7c888a9825c648db85a9de101fe9f58

  • Size

    160KB

  • Sample

    241230-wdl9xatraw

  • MD5

    0c7a401869a7355fa482babb6a31a20d

  • SHA1

    c52a320d4121a0310d861aa7617f1fbb503b3230

  • SHA256

    6d3e54dec8421488131aacc3dbc7177fe7c888a9825c648db85a9de101fe9f58

  • SHA512

    6dffcdde5bd5dc0925baf655d80f620316c8faeb249d63c02a6dad7333663389dc511302f210ff7ae886c72df2cb14675eefa03f9d4cbbfa8e0d30680afb2a3a

  • SSDEEP

    3072:8xT2d85tleLD51fC5AHYEoefukoTFMpGmjY8D:ty5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6d3e54dec8421488131aacc3dbc7177fe7c888a9825c648db85a9de101fe9f58

    • Size

      160KB

    • MD5

      0c7a401869a7355fa482babb6a31a20d

    • SHA1

      c52a320d4121a0310d861aa7617f1fbb503b3230

    • SHA256

      6d3e54dec8421488131aacc3dbc7177fe7c888a9825c648db85a9de101fe9f58

    • SHA512

      6dffcdde5bd5dc0925baf655d80f620316c8faeb249d63c02a6dad7333663389dc511302f210ff7ae886c72df2cb14675eefa03f9d4cbbfa8e0d30680afb2a3a

    • SSDEEP

      3072:8xT2d85tleLD51fC5AHYEoefukoTFMpGmjY8D:ty5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks