General

  • Target

    JaffaCakes118_60906d590fbc427c4c89eb328ba0ae6a9188fca832a02e0a33683b529de17ca8

  • Size

    160KB

  • Sample

    241230-yew7lsvrdp

  • MD5

    f74884cea35349d97f4f239f4661633e

  • SHA1

    a7ff54359490b6b1f8ffb8d3688282bd630895c5

  • SHA256

    60906d590fbc427c4c89eb328ba0ae6a9188fca832a02e0a33683b529de17ca8

  • SHA512

    2582a3c99ea5a3708dac22a3e1c4949582a49995607e1963c3a3335c18d2c22e7bce7a57027f82204f14df664c1f3dea6754acaa2dff1c7b7a1353065c46f3ab

  • SSDEEP

    3072:enT2d85tleLD51fC5AHYEoefukoTFMpGmjh8D:Fy5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_60906d590fbc427c4c89eb328ba0ae6a9188fca832a02e0a33683b529de17ca8

    • Size

      160KB

    • MD5

      f74884cea35349d97f4f239f4661633e

    • SHA1

      a7ff54359490b6b1f8ffb8d3688282bd630895c5

    • SHA256

      60906d590fbc427c4c89eb328ba0ae6a9188fca832a02e0a33683b529de17ca8

    • SHA512

      2582a3c99ea5a3708dac22a3e1c4949582a49995607e1963c3a3335c18d2c22e7bce7a57027f82204f14df664c1f3dea6754acaa2dff1c7b7a1353065c46f3ab

    • SSDEEP

      3072:enT2d85tleLD51fC5AHYEoefukoTFMpGmjh8D:Fy5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks