General

  • Target

    JaffaCakes118_152f7f4861853f66f3a1096605426f03a6176677c3c9498e81a4c593e7606f02

  • Size

    204KB

  • Sample

    241230-xmz3sswpds

  • MD5

    168f64297c4dd0254c0dc2779d230577

  • SHA1

    96dd41a3539ad60ab7bb6739dd0f0f81d86d4cb7

  • SHA256

    152f7f4861853f66f3a1096605426f03a6176677c3c9498e81a4c593e7606f02

  • SHA512

    af0f879d632dafbb26469848f987400df881c9681be90d5b0e9e299233faa55aba1ba23770960c9001fc4605f089791bd3f8e51c18f3073a664ac8a7d6d4b0b4

  • SSDEEP

    3072:Y6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:YZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_152f7f4861853f66f3a1096605426f03a6176677c3c9498e81a4c593e7606f02

    • Size

      204KB

    • MD5

      168f64297c4dd0254c0dc2779d230577

    • SHA1

      96dd41a3539ad60ab7bb6739dd0f0f81d86d4cb7

    • SHA256

      152f7f4861853f66f3a1096605426f03a6176677c3c9498e81a4c593e7606f02

    • SHA512

      af0f879d632dafbb26469848f987400df881c9681be90d5b0e9e299233faa55aba1ba23770960c9001fc4605f089791bd3f8e51c18f3073a664ac8a7d6d4b0b4

    • SSDEEP

      3072:Y6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:YZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks