General

  • Target

    JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29

  • Size

    158KB

  • Sample

    241230-ypp62synfx

  • MD5

    c6fc3275bc94bea5f7dbe4f8be6d933a

  • SHA1

    7bfd40286ece701c66ab27f203f371ffd991cc31

  • SHA256

    b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29

  • SHA512

    af71447b7be36991c7afa8f550afc52c8af3e542824c30454ec4cdfb75de071392540e59752b3dabe45500cbd3c6e6c77a24a5029d2800cbdcfe6cdced656e84

  • SSDEEP

    3072:4iFieJeVDC5PIh/31VeSDH2jW+zsKWncDlRe0PLDt:DeAU/TeSH26cs+7

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29

    • Size

      158KB

    • MD5

      c6fc3275bc94bea5f7dbe4f8be6d933a

    • SHA1

      7bfd40286ece701c66ab27f203f371ffd991cc31

    • SHA256

      b0ae2ed7b592dcb76893136c9b325ff36166fc415b02c015e6da389f54498e29

    • SHA512

      af71447b7be36991c7afa8f550afc52c8af3e542824c30454ec4cdfb75de071392540e59752b3dabe45500cbd3c6e6c77a24a5029d2800cbdcfe6cdced656e84

    • SSDEEP

      3072:4iFieJeVDC5PIh/31VeSDH2jW+zsKWncDlRe0PLDt:DeAU/TeSH26cs+7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks