General

  • Target

    JaffaCakes118_a7c725124aae3122247697ec601ad13ae525e9b3d85b0ce664548a2bb920ff0b

  • Size

    204KB

  • Sample

    241230-zhz84szrg1

  • MD5

    a9f5314078788e75cf8961956357018c

  • SHA1

    f56223b86213f21a01493976d6fc2e886d293af9

  • SHA256

    a7c725124aae3122247697ec601ad13ae525e9b3d85b0ce664548a2bb920ff0b

  • SHA512

    a60c565b03021cb1f282a93a64479028774c2cee96caf30101f3e987207bb07d2915ebf943c0280305690f60307acb7fb6621286c711ae554ab5104d53496263

  • SSDEEP

    3072:f6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:fZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a7c725124aae3122247697ec601ad13ae525e9b3d85b0ce664548a2bb920ff0b

    • Size

      204KB

    • MD5

      a9f5314078788e75cf8961956357018c

    • SHA1

      f56223b86213f21a01493976d6fc2e886d293af9

    • SHA256

      a7c725124aae3122247697ec601ad13ae525e9b3d85b0ce664548a2bb920ff0b

    • SHA512

      a60c565b03021cb1f282a93a64479028774c2cee96caf30101f3e987207bb07d2915ebf943c0280305690f60307acb7fb6621286c711ae554ab5104d53496263

    • SSDEEP

      3072:f6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:fZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks