General

  • Target

    JaffaCakes118_19410579bf4c644d71c3f97466e6956956b01bc7e2a7b9a5dff15a876b94093a

  • Size

    204KB

  • Sample

    241230-yx1yhszjct

  • MD5

    c7d307f111992359b37310054c5b0181

  • SHA1

    bdadd40bf3f5e9b986ac2a0c713d57bb774c7fb6

  • SHA256

    19410579bf4c644d71c3f97466e6956956b01bc7e2a7b9a5dff15a876b94093a

  • SHA512

    8fd84b9f8de621a858f74835ac9a5ac35dbe33098e73b2a90e172cb5c1ec1a843a8208e2cc4b8473ca3959e50e8f18c524ec2a9e0a61364cccf270100d2678ea

  • SSDEEP

    3072:t6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:tZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_19410579bf4c644d71c3f97466e6956956b01bc7e2a7b9a5dff15a876b94093a

    • Size

      204KB

    • MD5

      c7d307f111992359b37310054c5b0181

    • SHA1

      bdadd40bf3f5e9b986ac2a0c713d57bb774c7fb6

    • SHA256

      19410579bf4c644d71c3f97466e6956956b01bc7e2a7b9a5dff15a876b94093a

    • SHA512

      8fd84b9f8de621a858f74835ac9a5ac35dbe33098e73b2a90e172cb5c1ec1a843a8208e2cc4b8473ca3959e50e8f18c524ec2a9e0a61364cccf270100d2678ea

    • SSDEEP

      3072:t6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:tZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks