General

  • Target

    JaffaCakes118_6d0b5a78ec88662da29b7eda141661e3ca1fe1d23a5d536d7eac59609027aa94

  • Size

    160KB

  • Sample

    241230-1vqe4stkg1

  • MD5

    12ac5b6383dd118ea96c351926280b78

  • SHA1

    a4653ca9fbe043289153942ac52954dc17d8ab8c

  • SHA256

    6d0b5a78ec88662da29b7eda141661e3ca1fe1d23a5d536d7eac59609027aa94

  • SHA512

    0da1306ae385da78af6355534df4f786630c85a9071d61d0bf9f98b3d40d41d0a04eb6a817d68b96d89861ef3fd7fdc305aa90df2743c0d89083c7c0d911b56b

  • SSDEEP

    3072:7OOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:n8mnT7Fmsans1+0Hw7/t

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

185.148.168.240:443

162.216.125.131:2303

193.200.130.178:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6d0b5a78ec88662da29b7eda141661e3ca1fe1d23a5d536d7eac59609027aa94

    • Size

      160KB

    • MD5

      12ac5b6383dd118ea96c351926280b78

    • SHA1

      a4653ca9fbe043289153942ac52954dc17d8ab8c

    • SHA256

      6d0b5a78ec88662da29b7eda141661e3ca1fe1d23a5d536d7eac59609027aa94

    • SHA512

      0da1306ae385da78af6355534df4f786630c85a9071d61d0bf9f98b3d40d41d0a04eb6a817d68b96d89861ef3fd7fdc305aa90df2743c0d89083c7c0d911b56b

    • SSDEEP

      3072:7OOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:n8mnT7Fmsans1+0Hw7/t

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks