General

  • Target

    JaffaCakes118_9322ab475d4c53661d5f94e9ee6d8ba871cf3a65a093eae3c6a5492be8e678cc

  • Size

    170KB

  • Sample

    241223-z3jf4a1pct

  • MD5

    4302a8c58f29e7d9b6a50e9842ec63c1

  • SHA1

    32ef4349bd4ff04c5c16c63277f07c55f89d04de

  • SHA256

    9322ab475d4c53661d5f94e9ee6d8ba871cf3a65a093eae3c6a5492be8e678cc

  • SHA512

    c5849c7c27222e6c1b7f488a1e1c3f34a1cb6ec49c1239326f221fff0beb8ca88b74f574c8edfe2d44cf5e15c3c42e1f916bd728e7fd6285417bbf7e5ca12ca4

  • SSDEEP

    3072:zV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:zV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9322ab475d4c53661d5f94e9ee6d8ba871cf3a65a093eae3c6a5492be8e678cc

    • Size

      170KB

    • MD5

      4302a8c58f29e7d9b6a50e9842ec63c1

    • SHA1

      32ef4349bd4ff04c5c16c63277f07c55f89d04de

    • SHA256

      9322ab475d4c53661d5f94e9ee6d8ba871cf3a65a093eae3c6a5492be8e678cc

    • SHA512

      c5849c7c27222e6c1b7f488a1e1c3f34a1cb6ec49c1239326f221fff0beb8ca88b74f574c8edfe2d44cf5e15c3c42e1f916bd728e7fd6285417bbf7e5ca12ca4

    • SSDEEP

      3072:zV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:zV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks