General

  • Target

    JaffaCakes118_bb889228d5b8a44a2bb79c4b6881707b4dd589e196e22b060af80d41d5d71af3

  • Size

    159KB

  • Sample

    241230-ytp2vawpck

  • MD5

    72e96a966403e823153e95052c5f5683

  • SHA1

    5807294d1d62d60dc1c756c5724f0bead9302eb2

  • SHA256

    bb889228d5b8a44a2bb79c4b6881707b4dd589e196e22b060af80d41d5d71af3

  • SHA512

    18e68e7aa781a236aed32457ca704ec17aec7d7ab2fcf5109154e604298d828d12b4c16ad01bb9223f802773b96dfcbb5eea00390bf78d3f2ad7955c6bfa0b3c

  • SSDEEP

    3072:wi8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYY5Zwd:inClX8WZ7/HrRCADTR0VlTZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bb889228d5b8a44a2bb79c4b6881707b4dd589e196e22b060af80d41d5d71af3

    • Size

      159KB

    • MD5

      72e96a966403e823153e95052c5f5683

    • SHA1

      5807294d1d62d60dc1c756c5724f0bead9302eb2

    • SHA256

      bb889228d5b8a44a2bb79c4b6881707b4dd589e196e22b060af80d41d5d71af3

    • SHA512

      18e68e7aa781a236aed32457ca704ec17aec7d7ab2fcf5109154e604298d828d12b4c16ad01bb9223f802773b96dfcbb5eea00390bf78d3f2ad7955c6bfa0b3c

    • SSDEEP

      3072:wi8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYY5Zwd:inClX8WZ7/HrRCADTR0VlTZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks