General

  • Target

    JaffaCakes118_15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394

  • Size

    161KB

  • Sample

    241230-13ch8a1mbk

  • MD5

    fea64190f9e06aaa77a72766b83bdcc1

  • SHA1

    67ef2c6dc9cef833dad5c7ac556cf723fbcd7e22

  • SHA256

    15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394

  • SHA512

    5749186b35cdeba9379bbc6f7650ed0d251ec16bde33304fcb6a4bdd14f82bfdddcc0dca5501e8310f8328e5c0497a123b4bcfbf9a13aadbca09782a4b3761e7

  • SSDEEP

    3072:Hk2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Yp8AF:1G3rUvoU4JE/Wzan9T7B/CKsL/Yy

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

193.200.130.181:443

95.138.161.226:2303

167.114.113.13:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394

    • Size

      161KB

    • MD5

      fea64190f9e06aaa77a72766b83bdcc1

    • SHA1

      67ef2c6dc9cef833dad5c7ac556cf723fbcd7e22

    • SHA256

      15c40b3aa4df527ac8993cfc3d9f06e21ac07c601cee9fe4dbbe23a3daead394

    • SHA512

      5749186b35cdeba9379bbc6f7650ed0d251ec16bde33304fcb6a4bdd14f82bfdddcc0dca5501e8310f8328e5c0497a123b4bcfbf9a13aadbca09782a4b3761e7

    • SSDEEP

      3072:Hk2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Yp8AF:1G3rUvoU4JE/Wzan9T7B/CKsL/Yy

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks