General

  • Target

    JaffaCakes118_37b18254b690744897e2793661cc7e6f30e99e5789d4a061cc254715b8b70de8

  • Size

    154KB

  • Sample

    241230-wl5q8askbm

  • MD5

    80cab2983be7e8013c6af89138fd36fc

  • SHA1

    fd305280587ff4d08e4c8d6256e3f42cb5581713

  • SHA256

    37b18254b690744897e2793661cc7e6f30e99e5789d4a061cc254715b8b70de8

  • SHA512

    54dcce97c3e9c8ede1fd3bc5964e7a94719f34d535d9c435ca2554ac88cdc85f9e16062f625dade464732d2d9814b72f49d85ee379c37112fce3d5bbd40c704d

  • SSDEEP

    3072:ZZ+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBC:IQeVf/2gUU76rDeIgESXZmYYa

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_37b18254b690744897e2793661cc7e6f30e99e5789d4a061cc254715b8b70de8

    • Size

      154KB

    • MD5

      80cab2983be7e8013c6af89138fd36fc

    • SHA1

      fd305280587ff4d08e4c8d6256e3f42cb5581713

    • SHA256

      37b18254b690744897e2793661cc7e6f30e99e5789d4a061cc254715b8b70de8

    • SHA512

      54dcce97c3e9c8ede1fd3bc5964e7a94719f34d535d9c435ca2554ac88cdc85f9e16062f625dade464732d2d9814b72f49d85ee379c37112fce3d5bbd40c704d

    • SSDEEP

      3072:ZZ+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBC:IQeVf/2gUU76rDeIgESXZmYYa

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks