General

  • Target

    JaffaCakes118_2f25761d274d62a434d70685776d9df7ecc021e9785665bfacfe46650da43c43

  • Size

    159KB

  • Sample

    241230-yxarbsyrgz

  • MD5

    c71b8b788cea86dfbb51fb52e6802c61

  • SHA1

    8fa5d1b80ece76c0f3240bd7be5747a342e900d2

  • SHA256

    2f25761d274d62a434d70685776d9df7ecc021e9785665bfacfe46650da43c43

  • SHA512

    b7748d4a9dacf7668be743e37d59d8c8db9df6fe57a38f176a5d84acb271732760c5c1e87ee70707e3ea484f49bd58599809c944a91554a0a55b6d55ef5efd95

  • SSDEEP

    3072:R78CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYOZwd:6nClX8WZ7/HrRCADTR0VlIZw

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2f25761d274d62a434d70685776d9df7ecc021e9785665bfacfe46650da43c43

    • Size

      159KB

    • MD5

      c71b8b788cea86dfbb51fb52e6802c61

    • SHA1

      8fa5d1b80ece76c0f3240bd7be5747a342e900d2

    • SHA256

      2f25761d274d62a434d70685776d9df7ecc021e9785665bfacfe46650da43c43

    • SHA512

      b7748d4a9dacf7668be743e37d59d8c8db9df6fe57a38f176a5d84acb271732760c5c1e87ee70707e3ea484f49bd58599809c944a91554a0a55b6d55ef5efd95

    • SSDEEP

      3072:R78CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYOZwd:6nClX8WZ7/HrRCADTR0VlIZw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks