General

  • Target

    JaffaCakes118_864b5c51268262d098f08aefccb628465e44c4f0e496239a652df1fc2adacdeb

  • Size

    162KB

  • Sample

    241230-yxdszsyrht

  • MD5

    d640b319c9db79c81d2bc7cceaac46a7

  • SHA1

    558180e43894878deb4f3bac892c49537ab53d36

  • SHA256

    864b5c51268262d098f08aefccb628465e44c4f0e496239a652df1fc2adacdeb

  • SHA512

    e35c2d833eab6e134d53dc261a3dbdcf9890fa4eec1cb106ae9de327501a48093df0816b0f0a733fdcae68234bce8bdf35bd48cd6d0e2112b037aa32e51d3814

  • SSDEEP

    3072:QmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:5Lc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_864b5c51268262d098f08aefccb628465e44c4f0e496239a652df1fc2adacdeb

    • Size

      162KB

    • MD5

      d640b319c9db79c81d2bc7cceaac46a7

    • SHA1

      558180e43894878deb4f3bac892c49537ab53d36

    • SHA256

      864b5c51268262d098f08aefccb628465e44c4f0e496239a652df1fc2adacdeb

    • SHA512

      e35c2d833eab6e134d53dc261a3dbdcf9890fa4eec1cb106ae9de327501a48093df0816b0f0a733fdcae68234bce8bdf35bd48cd6d0e2112b037aa32e51d3814

    • SSDEEP

      3072:QmNFcsGvTmf9vOmoM0IZ5kPjBxYvdIL2KyOQaOP8+cMTH1PxsMYQnF1b1l:5Lc7UtOpM1Z5k1xYO2LXjTH1pH5nF1p

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks