General

  • Target

    JaffaCakes118_52672fba0f7c0c647f385c9b71a11d85

  • Size

    608KB

  • Sample

    250107-g32nkazngm

  • MD5

    52672fba0f7c0c647f385c9b71a11d85

  • SHA1

    9a8c5a505330abbe7e74fd9241a695deba76980f

  • SHA256

    9098e71efce9977e7391127789845543f403ed1cbff3c83554c1bb65733e1579

  • SHA512

    137c1cfc3061570c068b994db4e7edbdcffba1d48a4ba66515f7fe419af7914c7641b688f9a8616400a964dd3272452d0758d4ab1f73e4089fbd76f53c40547e

  • SSDEEP

    12288:CZGQdqOGMnJqydLqQSeCqsVK8kPRGO35N9mVHzXc6:CZ0mWjeCVVK8kP9N9oT

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_52672fba0f7c0c647f385c9b71a11d85

    • Size

      608KB

    • MD5

      52672fba0f7c0c647f385c9b71a11d85

    • SHA1

      9a8c5a505330abbe7e74fd9241a695deba76980f

    • SHA256

      9098e71efce9977e7391127789845543f403ed1cbff3c83554c1bb65733e1579

    • SHA512

      137c1cfc3061570c068b994db4e7edbdcffba1d48a4ba66515f7fe419af7914c7641b688f9a8616400a964dd3272452d0758d4ab1f73e4089fbd76f53c40547e

    • SSDEEP

      12288:CZGQdqOGMnJqydLqQSeCqsVK8kPRGO35N9mVHzXc6:CZ0mWjeCVVK8kP9N9oT

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks