General

  • Target

    JaffaCakes118_3ba1f8c8fcbee803b2e10a1bf89b21d5be23e43ce3f2d7939c88ada8bbf914c5

  • Size

    160KB

  • Sample

    241230-zl2w4sxrfj

  • MD5

    993c5eab49b0ce6b6671b3225aa128f6

  • SHA1

    9201ce858aea42a9803a3efc7ce5daaee3baabce

  • SHA256

    3ba1f8c8fcbee803b2e10a1bf89b21d5be23e43ce3f2d7939c88ada8bbf914c5

  • SHA512

    fee012efd7346f4e26830c4ffb65e21d0538324c52fc7cbe1f249fccfb2ef311dcb8ff0f1792e30a56d5e60af0f2d346329f331e99c2e90a443572d99259034f

  • SSDEEP

    3072:1ET2d85tleLD51fC5AHYEoefukoTFMpGmj58D:Zy5tAL11fNHYafoMpX

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3ba1f8c8fcbee803b2e10a1bf89b21d5be23e43ce3f2d7939c88ada8bbf914c5

    • Size

      160KB

    • MD5

      993c5eab49b0ce6b6671b3225aa128f6

    • SHA1

      9201ce858aea42a9803a3efc7ce5daaee3baabce

    • SHA256

      3ba1f8c8fcbee803b2e10a1bf89b21d5be23e43ce3f2d7939c88ada8bbf914c5

    • SHA512

      fee012efd7346f4e26830c4ffb65e21d0538324c52fc7cbe1f249fccfb2ef311dcb8ff0f1792e30a56d5e60af0f2d346329f331e99c2e90a443572d99259034f

    • SSDEEP

      3072:1ET2d85tleLD51fC5AHYEoefukoTFMpGmj58D:Zy5tAL11fNHYafoMpX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks