General

  • Target

    JaffaCakes118_99ffe7b6d624eb8d91afbb8b1f92c1a24514357b97cfc22d6c7f8e00c5511f54

  • Size

    157KB

  • Sample

    241230-zrg4wsykep

  • MD5

    6a439c76e6f8500261464ce072c4d509

  • SHA1

    ce5519486b3fa2387d36053f299aca5147baa060

  • SHA256

    99ffe7b6d624eb8d91afbb8b1f92c1a24514357b97cfc22d6c7f8e00c5511f54

  • SHA512

    5849a57ab8a38bd68649e946ce30d13777dc8a19854e2995ad1fe3501a2249c61f0fe0b3ae3238ef8247cdd90bc348505e9d007adfcddda86cd926f3cbbc15b9

  • SSDEEP

    3072:XXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:dMHNLvC1FoCGx//Xq

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_99ffe7b6d624eb8d91afbb8b1f92c1a24514357b97cfc22d6c7f8e00c5511f54

    • Size

      157KB

    • MD5

      6a439c76e6f8500261464ce072c4d509

    • SHA1

      ce5519486b3fa2387d36053f299aca5147baa060

    • SHA256

      99ffe7b6d624eb8d91afbb8b1f92c1a24514357b97cfc22d6c7f8e00c5511f54

    • SHA512

      5849a57ab8a38bd68649e946ce30d13777dc8a19854e2995ad1fe3501a2249c61f0fe0b3ae3238ef8247cdd90bc348505e9d007adfcddda86cd926f3cbbc15b9

    • SSDEEP

      3072:XXdgq2AQFBHNHrvCU0FoCGWi/isjLpWRGGJnHs9:dMHNLvC1FoCGx//Xq

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks