General

  • Target

    JaffaCakes118_ae6886efbb726efccda49ebb39ae48c28fce8dc5d765894e660b79012f0c0bd5

  • Size

    204KB

  • Sample

    241230-xwf2aatrhn

  • MD5

    ece18ce0a9032bf2e69fed2627295db0

  • SHA1

    2d6f0547eda1d1bc4b42a664fa4d3dc22b40b37b

  • SHA256

    ae6886efbb726efccda49ebb39ae48c28fce8dc5d765894e660b79012f0c0bd5

  • SHA512

    9081f76ef21b2ae453f5bfa11912d2400932bb370d4d53f7994b2870d2f804ce7bb8d7cc81f35ccbbc09b9d0821babd016cdb0b003d0df836a824878e31b6a29

  • SSDEEP

    3072:86FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:8ZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ae6886efbb726efccda49ebb39ae48c28fce8dc5d765894e660b79012f0c0bd5

    • Size

      204KB

    • MD5

      ece18ce0a9032bf2e69fed2627295db0

    • SHA1

      2d6f0547eda1d1bc4b42a664fa4d3dc22b40b37b

    • SHA256

      ae6886efbb726efccda49ebb39ae48c28fce8dc5d765894e660b79012f0c0bd5

    • SHA512

      9081f76ef21b2ae453f5bfa11912d2400932bb370d4d53f7994b2870d2f804ce7bb8d7cc81f35ccbbc09b9d0821babd016cdb0b003d0df836a824878e31b6a29

    • SSDEEP

      3072:86FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:8ZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks