General

  • Target

    JaffaCakes118_42eaa1a900c2e624ee0e0c396d3cf0d48670a11dde08b6bb7214920338506f5a

  • Size

    204KB

  • Sample

    241230-xwtmdaxjgs

  • MD5

    f9157ec58109415868202a7c321949ee

  • SHA1

    93733ef26a245a9a4752f2f10e4f8fb5b15f00b9

  • SHA256

    42eaa1a900c2e624ee0e0c396d3cf0d48670a11dde08b6bb7214920338506f5a

  • SHA512

    dabc542206542dc0c25f2b3f24c6b16bf77877c868b62dad7fa4e1b25af0450ab1ffb0c7ca119053dd319410a02d8c94000582062d13a436ffa07af75f3cc6a0

  • SSDEEP

    3072:q6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:qZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
1
UVIabEjB7cX6jVKokUQcey9IpyGEGPkvqXISjMkvOrRdeF
rc4.plain
1
A7nJdD3IzXdgiaHV1DVykZf4vgLdgyv3BjvHZxN0p1c96yC1jyzioBieIa2M

Targets

    • Target

      JaffaCakes118_42eaa1a900c2e624ee0e0c396d3cf0d48670a11dde08b6bb7214920338506f5a

    • Size

      204KB

    • MD5

      f9157ec58109415868202a7c321949ee

    • SHA1

      93733ef26a245a9a4752f2f10e4f8fb5b15f00b9

    • SHA256

      42eaa1a900c2e624ee0e0c396d3cf0d48670a11dde08b6bb7214920338506f5a

    • SHA512

      dabc542206542dc0c25f2b3f24c6b16bf77877c868b62dad7fa4e1b25af0450ab1ffb0c7ca119053dd319410a02d8c94000582062d13a436ffa07af75f3cc6a0

    • SSDEEP

      3072:q6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:qZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.