General

  • Target

    JaffaCakes118_6a7bc33195f253286109679c3d2a832fdff716f68ca78953c545fe3b57da6204

  • Size

    170KB

  • Sample

    241223-vfegeavphs

  • MD5

    4775f3f3589d787e7610d1fe7fd9b857

  • SHA1

    a4c197e6581af1c985a05bda17ad1563f09aeefa

  • SHA256

    6a7bc33195f253286109679c3d2a832fdff716f68ca78953c545fe3b57da6204

  • SHA512

    8406378a497159c0a2c7c2539322423412b8e2a09e909863651556dc7f222c019f0777bcdebd8a8fffaa493b3e885f3b3d6891a2786257bc3a6a0b50373432b7

  • SSDEEP

    3072:IV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:IV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6a7bc33195f253286109679c3d2a832fdff716f68ca78953c545fe3b57da6204

    • Size

      170KB

    • MD5

      4775f3f3589d787e7610d1fe7fd9b857

    • SHA1

      a4c197e6581af1c985a05bda17ad1563f09aeefa

    • SHA256

      6a7bc33195f253286109679c3d2a832fdff716f68ca78953c545fe3b57da6204

    • SHA512

      8406378a497159c0a2c7c2539322423412b8e2a09e909863651556dc7f222c019f0777bcdebd8a8fffaa493b3e885f3b3d6891a2786257bc3a6a0b50373432b7

    • SSDEEP

      3072:IV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:IV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks