General

  • Target

    JaffaCakes118_078f7d502cc8dd774c582afc682381bbb9ac4be61f0bebf0c7a1135e1db6e017

  • Size

    159KB

  • Sample

    241230-xyxf2sxkgv

  • MD5

    ea3db8dde749429c09b34fde4a15d0eb

  • SHA1

    77fae28c34736735da29a9ba2f8c85113889ee6a

  • SHA256

    078f7d502cc8dd774c582afc682381bbb9ac4be61f0bebf0c7a1135e1db6e017

  • SHA512

    09e41ea378a1b88de9b8ce05c5146ffa884812bb7873e62de18f2b49038dbdddba1dac70165e58b70d43a0ebc68d1524e96f01ef81cb605ffc3700d947ff744e

  • SSDEEP

    3072:Vi8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYY5Zwd:DnClX8WZ7/HrRCADTR0VlTZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_078f7d502cc8dd774c582afc682381bbb9ac4be61f0bebf0c7a1135e1db6e017

    • Size

      159KB

    • MD5

      ea3db8dde749429c09b34fde4a15d0eb

    • SHA1

      77fae28c34736735da29a9ba2f8c85113889ee6a

    • SHA256

      078f7d502cc8dd774c582afc682381bbb9ac4be61f0bebf0c7a1135e1db6e017

    • SHA512

      09e41ea378a1b88de9b8ce05c5146ffa884812bb7873e62de18f2b49038dbdddba1dac70165e58b70d43a0ebc68d1524e96f01ef81cb605ffc3700d947ff744e

    • SSDEEP

      3072:Vi8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYY5Zwd:DnClX8WZ7/HrRCADTR0VlTZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks