General

  • Target

    JaffaCakes118_7bad0d147d44f4fc3d51f331894267087b717dbdc2f4550f7f567a4aab83064f

  • Size

    170KB

  • Sample

    241230-127yqstngx

  • MD5

    5d46fc9b9598a6633683134bb50a75f4

  • SHA1

    7772b18a157e2e3032246255de6617a582f994bf

  • SHA256

    7bad0d147d44f4fc3d51f331894267087b717dbdc2f4550f7f567a4aab83064f

  • SHA512

    162960c07b4d5a66a0d0d2056b279061ea6afed9cd79a2d046e3f1192442f67fd0cfb255a230ea349fedb571e236cd273dc00d2c4b57e329a016df5d5fe09158

  • SSDEEP

    3072:0qWLBTrGNr0gl+CI3bc4ThMXu6GkqFmLqmjcRVmkHkKFhG2wwUJ5/lB:yVqNd+CIQHXu9VFmu0qU2CJ5

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

128.199.200.38:443

192.163.233.216:6601

43.229.206.244:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7bad0d147d44f4fc3d51f331894267087b717dbdc2f4550f7f567a4aab83064f

    • Size

      170KB

    • MD5

      5d46fc9b9598a6633683134bb50a75f4

    • SHA1

      7772b18a157e2e3032246255de6617a582f994bf

    • SHA256

      7bad0d147d44f4fc3d51f331894267087b717dbdc2f4550f7f567a4aab83064f

    • SHA512

      162960c07b4d5a66a0d0d2056b279061ea6afed9cd79a2d046e3f1192442f67fd0cfb255a230ea349fedb571e236cd273dc00d2c4b57e329a016df5d5fe09158

    • SSDEEP

      3072:0qWLBTrGNr0gl+CI3bc4ThMXu6GkqFmLqmjcRVmkHkKFhG2wwUJ5/lB:yVqNd+CIQHXu9VFmu0qU2CJ5

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks