General

  • Target

    JaffaCakes118_711d908ab53a62ba7fa772b507481bf2f7850e617e05b15b7bbb46fbc5b25e19

  • Size

    160KB

  • Sample

    241230-xt332axjaw

  • MD5

    9c1baefda696f8a2e36cd7b006731396

  • SHA1

    05686ed3457b8fbffd4b933222d364c8e480e86f

  • SHA256

    711d908ab53a62ba7fa772b507481bf2f7850e617e05b15b7bbb46fbc5b25e19

  • SHA512

    6c863095d1eb6a52eb518daeb4263d921a9783385d10fabc45e977548e0a82a8ca833074ce0efa72ba632b85db46faf3f1fb7943bd3dc70c77549c8203c4b7a5

  • SSDEEP

    3072:FUT2d85tleLD51fC5AHYEoefukoTFMpGmj08D:xy5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_711d908ab53a62ba7fa772b507481bf2f7850e617e05b15b7bbb46fbc5b25e19

    • Size

      160KB

    • MD5

      9c1baefda696f8a2e36cd7b006731396

    • SHA1

      05686ed3457b8fbffd4b933222d364c8e480e86f

    • SHA256

      711d908ab53a62ba7fa772b507481bf2f7850e617e05b15b7bbb46fbc5b25e19

    • SHA512

      6c863095d1eb6a52eb518daeb4263d921a9783385d10fabc45e977548e0a82a8ca833074ce0efa72ba632b85db46faf3f1fb7943bd3dc70c77549c8203c4b7a5

    • SSDEEP

      3072:FUT2d85tleLD51fC5AHYEoefukoTFMpGmj08D:xy5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks