General

  • Target

    JaffaCakes118_e46fed070d10e25dbe364b70080b6ef8e1ba50d9d60c905fe0caed0fbcf900b0

  • Size

    166KB

  • Sample

    241229-ccg41symdz

  • MD5

    b79529591a2764bbba7772b12aaa20d2

  • SHA1

    8d4f12be3dd0e3b35c4448e547646fe941ac3737

  • SHA256

    e46fed070d10e25dbe364b70080b6ef8e1ba50d9d60c905fe0caed0fbcf900b0

  • SHA512

    ae11c0169a67e8626c30261b77fc29092360d668c5218b682f2c95f9b7d286e8fac7148ad2dc8749f2c7d123f9eebc1cb671c4c7addb0bc5936373f9e53a5396

  • SSDEEP

    3072:vuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:v0czbty9uiaJlHE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e46fed070d10e25dbe364b70080b6ef8e1ba50d9d60c905fe0caed0fbcf900b0

    • Size

      166KB

    • MD5

      b79529591a2764bbba7772b12aaa20d2

    • SHA1

      8d4f12be3dd0e3b35c4448e547646fe941ac3737

    • SHA256

      e46fed070d10e25dbe364b70080b6ef8e1ba50d9d60c905fe0caed0fbcf900b0

    • SHA512

      ae11c0169a67e8626c30261b77fc29092360d668c5218b682f2c95f9b7d286e8fac7148ad2dc8749f2c7d123f9eebc1cb671c4c7addb0bc5936373f9e53a5396

    • SSDEEP

      3072:vuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:v0czbty9uiaJlHE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks