General

  • Target

    JaffaCakes118_1239f2292bec4e0ac4dfd1d7bae83c787a5f6cb8c87254de871edab8d66f9557

  • Size

    170KB

  • Sample

    241224-mhmxkavpcp

  • MD5

    5818edaa1c02d564c57a2f7e3e7be5ba

  • SHA1

    437849df5b383b759f7b78a7a81a01467b837cf4

  • SHA256

    1239f2292bec4e0ac4dfd1d7bae83c787a5f6cb8c87254de871edab8d66f9557

  • SHA512

    50ab84ccb6b67828a1c9c9da23834163756ab54f8c71ae64b2a582c19cb779cf165baaec4896775e52f44bfc8ae91bee438c30645b8b28ce242057c9368e3f86

  • SSDEEP

    3072:yV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:yV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1239f2292bec4e0ac4dfd1d7bae83c787a5f6cb8c87254de871edab8d66f9557

    • Size

      170KB

    • MD5

      5818edaa1c02d564c57a2f7e3e7be5ba

    • SHA1

      437849df5b383b759f7b78a7a81a01467b837cf4

    • SHA256

      1239f2292bec4e0ac4dfd1d7bae83c787a5f6cb8c87254de871edab8d66f9557

    • SHA512

      50ab84ccb6b67828a1c9c9da23834163756ab54f8c71ae64b2a582c19cb779cf165baaec4896775e52f44bfc8ae91bee438c30645b8b28ce242057c9368e3f86

    • SSDEEP

      3072:yV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:yV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks