General

  • Target

    JaffaCakes118_00e25793bb1e9978880c41f85f103c22c52633de5583bfa8c2d3cf15683c1540

  • Size

    162KB

  • Sample

    241230-xeasyawlgt

  • MD5

    b8be046c82dab0250dbe58b1760589ff

  • SHA1

    86eed476d68a96d30c3c3e7896c6f41973f737f0

  • SHA256

    00e25793bb1e9978880c41f85f103c22c52633de5583bfa8c2d3cf15683c1540

  • SHA512

    3dd728700c33d631eabcb04c051a93d1a333b8c747f8c2ce06e21362ae57bf86ec961488add160d249970a17361ad1b3a73a585123d9aee8105a8fe0d9e92aef

  • SSDEEP

    3072:vmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:uLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_00e25793bb1e9978880c41f85f103c22c52633de5583bfa8c2d3cf15683c1540

    • Size

      162KB

    • MD5

      b8be046c82dab0250dbe58b1760589ff

    • SHA1

      86eed476d68a96d30c3c3e7896c6f41973f737f0

    • SHA256

      00e25793bb1e9978880c41f85f103c22c52633de5583bfa8c2d3cf15683c1540

    • SHA512

      3dd728700c33d631eabcb04c051a93d1a333b8c747f8c2ce06e21362ae57bf86ec961488add160d249970a17361ad1b3a73a585123d9aee8105a8fe0d9e92aef

    • SSDEEP

      3072:vmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:uLc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks