General

  • Target

    JaffaCakes118_0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16

  • Size

    159KB

  • Sample

    241230-wyv3jssnek

  • MD5

    e674c7faf508bff9625d35a0661bb887

  • SHA1

    240a00c6fa097075c2644456b665820bd988199a

  • SHA256

    0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16

  • SHA512

    2db6981109be177e46417c624089b9654180c263494788841889949b24799ec40248cb9d0887603648f815cc85eb700e7ad8bde73e02d2e8415953ac007040f1

  • SSDEEP

    3072:6s8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYXZwd:+nClX8WZ7/HrRCADTR0VldZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16

    • Size

      159KB

    • MD5

      e674c7faf508bff9625d35a0661bb887

    • SHA1

      240a00c6fa097075c2644456b665820bd988199a

    • SHA256

      0b3860dd52c0a4f44500f6cbf7200430922c3227dff57d1f8c23564ba9fe1b16

    • SHA512

      2db6981109be177e46417c624089b9654180c263494788841889949b24799ec40248cb9d0887603648f815cc85eb700e7ad8bde73e02d2e8415953ac007040f1

    • SSDEEP

      3072:6s8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYXZwd:+nClX8WZ7/HrRCADTR0VldZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks