General

  • Target

    0a1278a06a4d7bf4b0a152fccf9b8863_JaffaCakes118

  • Size

    711KB

  • Sample

    240624-wv5gtaygnn

  • MD5

    0a1278a06a4d7bf4b0a152fccf9b8863

  • SHA1

    0908c23b283f3b4b361b24b2c6716c178d0cc6b3

  • SHA256

    e8048d57153281e57b4c3937346165aa89f802c9d17c34045b23d2f946817e40

  • SHA512

    89d4776eeed59aebf209fbca578ac8f78dcd677d8c8e2de764755ad4771ce1308e35839aae1223fa13fdef96a1ec9b89b207f068cf22bf43586e0bcecfc73b3c

  • SSDEEP

    12288:llXKhZVSOww88nuNgEGyKw9lQJm4Drh0XJWhPJjiHYgPa8BvxY:7yLwVROPXwH+Dt0gPJji9PNY

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

77.220.64.132:443

212.227.53.240:5037

192.241.174.45:8172

rc4.plain
rc4.plain

Targets

    • Target

      0a1278a06a4d7bf4b0a152fccf9b8863_JaffaCakes118

    • Size

      711KB

    • MD5

      0a1278a06a4d7bf4b0a152fccf9b8863

    • SHA1

      0908c23b283f3b4b361b24b2c6716c178d0cc6b3

    • SHA256

      e8048d57153281e57b4c3937346165aa89f802c9d17c34045b23d2f946817e40

    • SHA512

      89d4776eeed59aebf209fbca578ac8f78dcd677d8c8e2de764755ad4771ce1308e35839aae1223fa13fdef96a1ec9b89b207f068cf22bf43586e0bcecfc73b3c

    • SSDEEP

      12288:llXKhZVSOww88nuNgEGyKw9lQJm4Drh0XJWhPJjiHYgPa8BvxY:7yLwVROPXwH+Dt0gPJji9PNY

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks