General

  • Target

    JaffaCakes118_740c9c0661595c96b4edcfea9961aaec50b14b7e1f94054c1304a775e895cc17

  • Size

    166KB

  • Sample

    241229-dratxs1kfv

  • MD5

    3d8b9d8cf777a13c9c7ca1e61faa2641

  • SHA1

    406585cf0c8a3d60b08c492883b8f71b8b0e25fe

  • SHA256

    740c9c0661595c96b4edcfea9961aaec50b14b7e1f94054c1304a775e895cc17

  • SHA512

    49b563f5bd94479fc30baf8f82ed07b1341d8977506d489be40283feb6b1dc3584ad76ba3303a5cd993c79ed6d28ab16c757ba27f78c4e0fdc151ce3350335f3

  • SSDEEP

    3072:CuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+pk:C0czbty9uiaJlEk

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_740c9c0661595c96b4edcfea9961aaec50b14b7e1f94054c1304a775e895cc17

    • Size

      166KB

    • MD5

      3d8b9d8cf777a13c9c7ca1e61faa2641

    • SHA1

      406585cf0c8a3d60b08c492883b8f71b8b0e25fe

    • SHA256

      740c9c0661595c96b4edcfea9961aaec50b14b7e1f94054c1304a775e895cc17

    • SHA512

      49b563f5bd94479fc30baf8f82ed07b1341d8977506d489be40283feb6b1dc3584ad76ba3303a5cd993c79ed6d28ab16c757ba27f78c4e0fdc151ce3350335f3

    • SSDEEP

      3072:CuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+pk:C0czbty9uiaJlEk

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks