General

  • Target

    JaffaCakes118_684203a2255992e5f5bfc7941dc293a4d02ad1e854adfab54851c8fa86c47ab0

  • Size

    204KB

  • Sample

    241230-zvzhca1ndy

  • MD5

    e4c21a2f991881627acd5995d00a82ba

  • SHA1

    7989b22ff989f5f7d8d2170afcef67e2b7c6875c

  • SHA256

    684203a2255992e5f5bfc7941dc293a4d02ad1e854adfab54851c8fa86c47ab0

  • SHA512

    b3b2db1a8d5d601fff99170f8d7587d38a8004ffd92688795b7b0a076540947b6ba3c27eee55c44f2e7fa8031018f274e508c5eb81401dd44a770fe388d15c62

  • SSDEEP

    3072:a6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:aZuX6pEaeEDheWa+Jc9bhorfTw

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

45.58.56.12:443

162.241.54.59:6601

51.91.76.89:2303

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_684203a2255992e5f5bfc7941dc293a4d02ad1e854adfab54851c8fa86c47ab0

    • Size

      204KB

    • MD5

      e4c21a2f991881627acd5995d00a82ba

    • SHA1

      7989b22ff989f5f7d8d2170afcef67e2b7c6875c

    • SHA256

      684203a2255992e5f5bfc7941dc293a4d02ad1e854adfab54851c8fa86c47ab0

    • SHA512

      b3b2db1a8d5d601fff99170f8d7587d38a8004ffd92688795b7b0a076540947b6ba3c27eee55c44f2e7fa8031018f274e508c5eb81401dd44a770fe388d15c62

    • SSDEEP

      3072:a6FOf6h8i6pdDPvaaeEGObTS/HaoGoK9kN+Jcr9bhrFKL3fJpwZ:aZuX6pEaeEDheWa+Jc9bhorfTw

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks