General

  • Target

    JaffaCakes118_fd7d6b581ec8eef370c975acd6ab5adca127d5be5ae9cd4ff91f7367cbbf7aef

  • Size

    158KB

  • Sample

    241230-xbcs5atjfq

  • MD5

    6f5dd022d2e7b48a2c1be9f3cd01f0d9

  • SHA1

    7eb04728e494357dc673be184a8997c94533ca7b

  • SHA256

    fd7d6b581ec8eef370c975acd6ab5adca127d5be5ae9cd4ff91f7367cbbf7aef

  • SHA512

    eb2c9a1661514e67ea4db40ac473725f2b4ec9588377cf5645fee27bcfb324f18a19a7d6b4773254a7e60c6d2d55cd18f191a369a4730e57d4570c2ff495b8e7

  • SSDEEP

    3072:DiFieJeVDC5PIh/31VeSDH2jW+zsKWncDlRe0PLDt:geAU/TeSH26cs+7

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fd7d6b581ec8eef370c975acd6ab5adca127d5be5ae9cd4ff91f7367cbbf7aef

    • Size

      158KB

    • MD5

      6f5dd022d2e7b48a2c1be9f3cd01f0d9

    • SHA1

      7eb04728e494357dc673be184a8997c94533ca7b

    • SHA256

      fd7d6b581ec8eef370c975acd6ab5adca127d5be5ae9cd4ff91f7367cbbf7aef

    • SHA512

      eb2c9a1661514e67ea4db40ac473725f2b4ec9588377cf5645fee27bcfb324f18a19a7d6b4773254a7e60c6d2d55cd18f191a369a4730e57d4570c2ff495b8e7

    • SSDEEP

      3072:DiFieJeVDC5PIh/31VeSDH2jW+zsKWncDlRe0PLDt:geAU/TeSH26cs+7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks