General

  • Target

    JaffaCakes118_190e76d752e7c9ea750466e0549a0f53

  • Size

    608KB

  • Sample

    250106-kb61ratpfq

  • MD5

    190e76d752e7c9ea750466e0549a0f53

  • SHA1

    c2645efe7b2ea5cd64e1ce35471b8091e534967d

  • SHA256

    a17b5c2a53c5eba0a985a27f8e8d3d1682710ffff2655ddbe28b71b8e320cff7

  • SHA512

    479898d5be5ff28d2c248978715f8a47f13c5141568aa6f68801a3245b9ca9c94595d2ac0a793852ac72e1218f37b028fba182d388741c583f715946850ba0d5

  • SSDEEP

    12288:pZGQdqOG5tJqydLqQSeCqsVK8kPRGO35N9mVBzXc6:pZ0TWjeCVVK8kP9N9ot

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_190e76d752e7c9ea750466e0549a0f53

    • Size

      608KB

    • MD5

      190e76d752e7c9ea750466e0549a0f53

    • SHA1

      c2645efe7b2ea5cd64e1ce35471b8091e534967d

    • SHA256

      a17b5c2a53c5eba0a985a27f8e8d3d1682710ffff2655ddbe28b71b8e320cff7

    • SHA512

      479898d5be5ff28d2c248978715f8a47f13c5141568aa6f68801a3245b9ca9c94595d2ac0a793852ac72e1218f37b028fba182d388741c583f715946850ba0d5

    • SSDEEP

      12288:pZGQdqOG5tJqydLqQSeCqsVK8kPRGO35N9mVBzXc6:pZ0TWjeCVVK8kP9N9ot

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks