General

  • Target

    JaffaCakes118_63d66f6c0234dedd40f3069537ff9eb5bca67a8151c5f242f7dd7c7bc65ee84c

  • Size

    166KB

  • Sample

    241223-wghe5awpgr

  • MD5

    663c75f10aa22e491e549f0d51bd7b35

  • SHA1

    3f736d456a18cbb3c480fba378d7310209eb40c9

  • SHA256

    63d66f6c0234dedd40f3069537ff9eb5bca67a8151c5f242f7dd7c7bc65ee84c

  • SHA512

    311c6c8e56b4d97d9bf1bd141d088eef355651402a4b989f07e169eb848f196e0eeb2fb603341c534814844016ec22a9b3527e83bbf01b8883caed2eb8c6930f

  • SSDEEP

    3072:euFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:e0czbty9uiaJlHE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_63d66f6c0234dedd40f3069537ff9eb5bca67a8151c5f242f7dd7c7bc65ee84c

    • Size

      166KB

    • MD5

      663c75f10aa22e491e549f0d51bd7b35

    • SHA1

      3f736d456a18cbb3c480fba378d7310209eb40c9

    • SHA256

      63d66f6c0234dedd40f3069537ff9eb5bca67a8151c5f242f7dd7c7bc65ee84c

    • SHA512

      311c6c8e56b4d97d9bf1bd141d088eef355651402a4b989f07e169eb848f196e0eeb2fb603341c534814844016ec22a9b3527e83bbf01b8883caed2eb8c6930f

    • SSDEEP

      3072:euFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:e0czbty9uiaJlHE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks