General

  • Target

    JaffaCakes118_0f6a020aa787617ae4e6c8db218a30d8cc1bad0a60c99aea14dd9600e29c0d86

  • Size

    166KB

  • Sample

    241230-15d5tstpgx

  • MD5

    5bc0faa7d8ffe6ab4e265cf69413c539

  • SHA1

    26dcfc1a0e17aaaec5f579a66c200d0f8fb3f71e

  • SHA256

    0f6a020aa787617ae4e6c8db218a30d8cc1bad0a60c99aea14dd9600e29c0d86

  • SHA512

    ce2f14d5823a23dec13c7bc6870a6f2e675c96c3d7d51f02ce23e00c55c90cab10031fd9b18af92c17c22b090f7ede7926881b42509e7ee03cb67fcaec7d34ac

  • SSDEEP

    3072:JBoQctVOM7/8wZQvUlM7EF+V2xReSbHNjztUJQ8eHVR:XuXLcclWEc2HeSjNjGde1R

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0f6a020aa787617ae4e6c8db218a30d8cc1bad0a60c99aea14dd9600e29c0d86

    • Size

      166KB

    • MD5

      5bc0faa7d8ffe6ab4e265cf69413c539

    • SHA1

      26dcfc1a0e17aaaec5f579a66c200d0f8fb3f71e

    • SHA256

      0f6a020aa787617ae4e6c8db218a30d8cc1bad0a60c99aea14dd9600e29c0d86

    • SHA512

      ce2f14d5823a23dec13c7bc6870a6f2e675c96c3d7d51f02ce23e00c55c90cab10031fd9b18af92c17c22b090f7ede7926881b42509e7ee03cb67fcaec7d34ac

    • SSDEEP

      3072:JBoQctVOM7/8wZQvUlM7EF+V2xReSbHNjztUJQ8eHVR:XuXLcclWEc2HeSjNjGde1R

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks