General

  • Target

    JaffaCakes118_ed3c58386b8e46d8cb0a19c21640776ec4c41099f917a21f2c3344e9632728b0

  • Size

    204KB

  • Sample

    241230-xyz7yavjhl

  • MD5

    9954eba477a8cdca53100da9ab5530d0

  • SHA1

    5e7a80bec8b74e8933974eea7b5f558de1ab3f6a

  • SHA256

    ed3c58386b8e46d8cb0a19c21640776ec4c41099f917a21f2c3344e9632728b0

  • SHA512

    fd9a4c9979c26194bf947e61f5680e3f2c873bab60dcb011b77117daf1e7f9ef86910841d00c32496f7a0ba9dfdbb98d88929da94f9d0f691aa95abadae3c134

  • SSDEEP

    3072:46FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:4ZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
1
UVIabEjB7cX6jVKokUQcey9IpyGEGPkvqXISjMkvOrRdeF
rc4.plain
1
A7nJdD3IzXdgiaHV1DVykZf4vgLdgyv3BjvHZxN0p1c96yC1jyzioBieIa2M

Targets

    • Target

      JaffaCakes118_ed3c58386b8e46d8cb0a19c21640776ec4c41099f917a21f2c3344e9632728b0

    • Size

      204KB

    • MD5

      9954eba477a8cdca53100da9ab5530d0

    • SHA1

      5e7a80bec8b74e8933974eea7b5f558de1ab3f6a

    • SHA256

      ed3c58386b8e46d8cb0a19c21640776ec4c41099f917a21f2c3344e9632728b0

    • SHA512

      fd9a4c9979c26194bf947e61f5680e3f2c873bab60dcb011b77117daf1e7f9ef86910841d00c32496f7a0ba9dfdbb98d88929da94f9d0f691aa95abadae3c134

    • SSDEEP

      3072:46FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:4ZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.