General

  • Target

    JaffaCakes118_9ae6b4c60928397f9d1644fe2a8667f7c9b5f25a78027277c91541ea703325c7

  • Size

    170KB

  • Sample

    241223-x2dhcaykes

  • MD5

    045bd641eca353b3987b6a0d265f7478

  • SHA1

    7b02203c53ed876bee4ef9d3062f07a0b2ca4e6e

  • SHA256

    9ae6b4c60928397f9d1644fe2a8667f7c9b5f25a78027277c91541ea703325c7

  • SHA512

    9d5e10d25bbaed4a83648f7986460f8c736d4359f9f85f52ab14555b404cf648ded7029da9b9d11b56217ca20b78356abcfff205cbb3a4089b8b447dcf968421

  • SSDEEP

    3072:uV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:uV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9ae6b4c60928397f9d1644fe2a8667f7c9b5f25a78027277c91541ea703325c7

    • Size

      170KB

    • MD5

      045bd641eca353b3987b6a0d265f7478

    • SHA1

      7b02203c53ed876bee4ef9d3062f07a0b2ca4e6e

    • SHA256

      9ae6b4c60928397f9d1644fe2a8667f7c9b5f25a78027277c91541ea703325c7

    • SHA512

      9d5e10d25bbaed4a83648f7986460f8c736d4359f9f85f52ab14555b404cf648ded7029da9b9d11b56217ca20b78356abcfff205cbb3a4089b8b447dcf968421

    • SSDEEP

      3072:uV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:uV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks