General

  • Target

    JaffaCakes118_ae2a05e8df1d16204c7107f2450c6bbbcb7d123770140addba3272ec4e398245

  • Size

    157KB

  • Sample

    241230-zhcstaxphj

  • MD5

    eefe34c9b8f89ab3b84a7e215e31e483

  • SHA1

    4b859a9ad96bae72804f7346da3c94eb2a933964

  • SHA256

    ae2a05e8df1d16204c7107f2450c6bbbcb7d123770140addba3272ec4e398245

  • SHA512

    504b8bc506816ace3d197282ba0242686bb16bfa6dcf2f30afb8c69e28ef0238b186373522c02c23e43c0751c6bbe7104ff4e273e73dc7c61d799202297ede66

  • SSDEEP

    3072:cXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:cMHNLvC1FoCGx//Xq

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ae2a05e8df1d16204c7107f2450c6bbbcb7d123770140addba3272ec4e398245

    • Size

      157KB

    • MD5

      eefe34c9b8f89ab3b84a7e215e31e483

    • SHA1

      4b859a9ad96bae72804f7346da3c94eb2a933964

    • SHA256

      ae2a05e8df1d16204c7107f2450c6bbbcb7d123770140addba3272ec4e398245

    • SHA512

      504b8bc506816ace3d197282ba0242686bb16bfa6dcf2f30afb8c69e28ef0238b186373522c02c23e43c0751c6bbe7104ff4e273e73dc7c61d799202297ede66

    • SSDEEP

      3072:cXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:cMHNLvC1FoCGx//Xq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks