General

  • Target

    JaffaCakes118_8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3

  • Size

    608KB

  • Sample

    241230-wp1lnsvlet

  • MD5

    5594530e878fdfe0738cc51ea044d7f5

  • SHA1

    991d77337090fffc904bd0f3d77cf8749a0a70a2

  • SHA256

    8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3

  • SHA512

    de7c30148898c9ed9bd9aaf3e91e4f75dc06b53708dd1177969b1b7c945d0910ccbd66da8095f62bfeb9ced36541fef18ef54dfb90baa5342935c47df4e68884

  • SSDEEP

    12288:qZGQdqOG9RJqydLqQSeCqsVK8kPRGO35N9mVpzXc6:qZ0HWjeCVVK8kP9N9ol

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3

    • Size

      608KB

    • MD5

      5594530e878fdfe0738cc51ea044d7f5

    • SHA1

      991d77337090fffc904bd0f3d77cf8749a0a70a2

    • SHA256

      8054037b6f4591d899c8b2b8df16e0bfcd1e29a07491be45272c7bb7014ce5e3

    • SHA512

      de7c30148898c9ed9bd9aaf3e91e4f75dc06b53708dd1177969b1b7c945d0910ccbd66da8095f62bfeb9ced36541fef18ef54dfb90baa5342935c47df4e68884

    • SSDEEP

      12288:qZGQdqOG9RJqydLqQSeCqsVK8kPRGO35N9mVpzXc6:qZ0HWjeCVVK8kP9N9ol

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks