General

  • Target

    JaffaCakes118_e25aa7532af698be55f4e320e504a018276e60bc44cea9778c44afec4e4b7876

  • Size

    204KB

  • Sample

    241230-zjw8va1jcz

  • MD5

    512a0189c898089748d34f481a66bdd3

  • SHA1

    9ff8aebbdaf1a38e13c0a22dc41a1a0430667ed1

  • SHA256

    e25aa7532af698be55f4e320e504a018276e60bc44cea9778c44afec4e4b7876

  • SHA512

    9a876fbd7bbe33c54987af0ca00c8ed596b18a6266b837cfa089718f2e3a215bf760dc07ff9e2c1de1563c58fea073fbc21a931faa2d1bc3d7421ad081689c20

  • SSDEEP

    3072:p6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:pZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
1
UVIabEjB7cX6jVKokUQcey9IpyGEGPkvqXISjMkvOrRdeF
rc4.plain
1
A7nJdD3IzXdgiaHV1DVykZf4vgLdgyv3BjvHZxN0p1c96yC1jyzioBieIa2M

Targets

    • Target

      JaffaCakes118_e25aa7532af698be55f4e320e504a018276e60bc44cea9778c44afec4e4b7876

    • Size

      204KB

    • MD5

      512a0189c898089748d34f481a66bdd3

    • SHA1

      9ff8aebbdaf1a38e13c0a22dc41a1a0430667ed1

    • SHA256

      e25aa7532af698be55f4e320e504a018276e60bc44cea9778c44afec4e4b7876

    • SHA512

      9a876fbd7bbe33c54987af0ca00c8ed596b18a6266b837cfa089718f2e3a215bf760dc07ff9e2c1de1563c58fea073fbc21a931faa2d1bc3d7421ad081689c20

    • SSDEEP

      3072:p6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:pZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.