General

  • Target

    JaffaCakes118_6985607727c2e824b36e09716c2e2e429cc87cd54e84417e297d18f37c0ded81

  • Size

    154KB

  • Sample

    241230-zrbbca1mbx

  • MD5

    5d075aee09a52ae59a1acffcb9e10cec

  • SHA1

    fad1ea88938d6c08700c2adb680cc10456138b87

  • SHA256

    6985607727c2e824b36e09716c2e2e429cc87cd54e84417e297d18f37c0ded81

  • SHA512

    25511ec50c4726ea776dcf97db93e742e8cf13b6740b70d88785813acc118e364e999ce09527c5bca2c696c038fff38ba53c710ebca37e2f6fffad4931310c6a

  • SSDEEP

    3072:/Z+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBC:uQeVf/2gUU76rDeIgESXZmYYa

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6985607727c2e824b36e09716c2e2e429cc87cd54e84417e297d18f37c0ded81

    • Size

      154KB

    • MD5

      5d075aee09a52ae59a1acffcb9e10cec

    • SHA1

      fad1ea88938d6c08700c2adb680cc10456138b87

    • SHA256

      6985607727c2e824b36e09716c2e2e429cc87cd54e84417e297d18f37c0ded81

    • SHA512

      25511ec50c4726ea776dcf97db93e742e8cf13b6740b70d88785813acc118e364e999ce09527c5bca2c696c038fff38ba53c710ebca37e2f6fffad4931310c6a

    • SSDEEP

      3072:/Z+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBC:uQeVf/2gUU76rDeIgESXZmYYa

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks