General

  • Target

    JaffaCakes118_a956928bafd3b19251942c8a33e793597e626187552d9bf17c05816098799c20

  • Size

    204KB

  • Sample

    241230-xrqd6awrbz

  • MD5

    a06bf94b79d9dea8d231c82d617c1ba8

  • SHA1

    4080f3e916846d8837306c288bc204faacbd2180

  • SHA256

    a956928bafd3b19251942c8a33e793597e626187552d9bf17c05816098799c20

  • SHA512

    806450b72a791303481d5c3e22bdbeb7c47adfcc1669442c1be37a20d9368a9fb42d52e95263a0b4afb80e16a13cd876361986f37cf877c12852cb4d23abda1d

  • SSDEEP

    3072:Q6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:QZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a956928bafd3b19251942c8a33e793597e626187552d9bf17c05816098799c20

    • Size

      204KB

    • MD5

      a06bf94b79d9dea8d231c82d617c1ba8

    • SHA1

      4080f3e916846d8837306c288bc204faacbd2180

    • SHA256

      a956928bafd3b19251942c8a33e793597e626187552d9bf17c05816098799c20

    • SHA512

      806450b72a791303481d5c3e22bdbeb7c47adfcc1669442c1be37a20d9368a9fb42d52e95263a0b4afb80e16a13cd876361986f37cf877c12852cb4d23abda1d

    • SSDEEP

      3072:Q6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:QZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks