General

  • Target

    JaffaCakes118_f673e571b104caf364963a5bfc0b0e3972d6407297de7560cf643bd1cd2790fa

  • Size

    170KB

  • Sample

    241223-2r8b7atrdq

  • MD5

    d19884ce8db58d3e662b50b380985ec5

  • SHA1

    704ee8ef81c4d8a134a3d64bbe2f1e0c2de89c01

  • SHA256

    f673e571b104caf364963a5bfc0b0e3972d6407297de7560cf643bd1cd2790fa

  • SHA512

    b06a19f2d908a60d9e49f104071e7d504e56cdc17a2d2f6890100a41e9fdfbe459df90120e171e6735f980c3a210a5c2973af6c1f5a4ac9008b17ef3021fbf18

  • SSDEEP

    3072:wV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:wV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f673e571b104caf364963a5bfc0b0e3972d6407297de7560cf643bd1cd2790fa

    • Size

      170KB

    • MD5

      d19884ce8db58d3e662b50b380985ec5

    • SHA1

      704ee8ef81c4d8a134a3d64bbe2f1e0c2de89c01

    • SHA256

      f673e571b104caf364963a5bfc0b0e3972d6407297de7560cf643bd1cd2790fa

    • SHA512

      b06a19f2d908a60d9e49f104071e7d504e56cdc17a2d2f6890100a41e9fdfbe459df90120e171e6735f980c3a210a5c2973af6c1f5a4ac9008b17ef3021fbf18

    • SSDEEP

      3072:wV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:wV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks