General

  • Target

    JaffaCakes118_34b9c0a9b1cfd47bc4886afb0932a44745df16b5ddb112c72d8ce6d742335f75

  • Size

    161KB

  • Sample

    241223-zg9fdszrhz

  • MD5

    0b6a9bb450162b58625466244a2cd3dd

  • SHA1

    9206aff26fed1db02cb4d5759ff3cb18b4a775cc

  • SHA256

    34b9c0a9b1cfd47bc4886afb0932a44745df16b5ddb112c72d8ce6d742335f75

  • SHA512

    32ae40d8a0b3db1f8d33526ae8587a54e28aa57789038811d999bac68d85fe5a03dc12400a3433b3e8c893ded8a5428a2aeff041c70b59fd90e0536dffa4b72c

  • SSDEEP

    3072:Bb63mpMBf4M8+pwhukvhU7fWaX/77/DZgTmbg+MGaFplA33VBrUSCx3:xa/jkvhSlP/7bg8aFnA3brA

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

193.200.130.181:443

95.138.161.226:2303

167.114.113.13:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_34b9c0a9b1cfd47bc4886afb0932a44745df16b5ddb112c72d8ce6d742335f75

    • Size

      161KB

    • MD5

      0b6a9bb450162b58625466244a2cd3dd

    • SHA1

      9206aff26fed1db02cb4d5759ff3cb18b4a775cc

    • SHA256

      34b9c0a9b1cfd47bc4886afb0932a44745df16b5ddb112c72d8ce6d742335f75

    • SHA512

      32ae40d8a0b3db1f8d33526ae8587a54e28aa57789038811d999bac68d85fe5a03dc12400a3433b3e8c893ded8a5428a2aeff041c70b59fd90e0536dffa4b72c

    • SSDEEP

      3072:Bb63mpMBf4M8+pwhukvhU7fWaX/77/DZgTmbg+MGaFplA33VBrUSCx3:xa/jkvhSlP/7bg8aFnA3brA

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks