General

  • Target

    JaffaCakes118_7b8cb657b4f1bc17069415a1bd338b5934feb6300b7d767bb5ed961d1efb2f19

  • Size

    170KB

  • Sample

    241223-3x99eavrax

  • MD5

    077a4c8219d2232a3a6b8e961608ec75

  • SHA1

    e2a426badbbdec97d0f2c20fd45a70a78dbd9ad4

  • SHA256

    7b8cb657b4f1bc17069415a1bd338b5934feb6300b7d767bb5ed961d1efb2f19

  • SHA512

    5267c69b3c346651dd9dfad6e15d5b2da0d52cba9eeb15161702c902cdd2276b1fe6970b1572b65a455afcdace240cdc6ea498682af5e71ee979661e697fc99f

  • SSDEEP

    3072:PV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:PV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7b8cb657b4f1bc17069415a1bd338b5934feb6300b7d767bb5ed961d1efb2f19

    • Size

      170KB

    • MD5

      077a4c8219d2232a3a6b8e961608ec75

    • SHA1

      e2a426badbbdec97d0f2c20fd45a70a78dbd9ad4

    • SHA256

      7b8cb657b4f1bc17069415a1bd338b5934feb6300b7d767bb5ed961d1efb2f19

    • SHA512

      5267c69b3c346651dd9dfad6e15d5b2da0d52cba9eeb15161702c902cdd2276b1fe6970b1572b65a455afcdace240cdc6ea498682af5e71ee979661e697fc99f

    • SSDEEP

      3072:PV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:PV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks