General

  • Target

    JaffaCakes118_ce9f8ca7e9a82e92b572e3f227f9061ecdded7b6f21bb6e95abc8d6052dcad65

  • Size

    172KB

  • Sample

    241230-1vyfqazrgr

  • MD5

    7f86bd797273dce1c96237aff585b462

  • SHA1

    d703e9982b8c62eb68923116d7d0ef54c9086692

  • SHA256

    ce9f8ca7e9a82e92b572e3f227f9061ecdded7b6f21bb6e95abc8d6052dcad65

  • SHA512

    6fd7ab20cf18881b95d850d0800194f4f761133377004fb33dd96f82661d8143cb41e98fe6f811b4c68dcebf9f6060fb437365ad529b3f9dbdd085cbc51ce755

  • SSDEEP

    3072:TWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:TWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ce9f8ca7e9a82e92b572e3f227f9061ecdded7b6f21bb6e95abc8d6052dcad65

    • Size

      172KB

    • MD5

      7f86bd797273dce1c96237aff585b462

    • SHA1

      d703e9982b8c62eb68923116d7d0ef54c9086692

    • SHA256

      ce9f8ca7e9a82e92b572e3f227f9061ecdded7b6f21bb6e95abc8d6052dcad65

    • SHA512

      6fd7ab20cf18881b95d850d0800194f4f761133377004fb33dd96f82661d8143cb41e98fe6f811b4c68dcebf9f6060fb437365ad529b3f9dbdd085cbc51ce755

    • SSDEEP

      3072:TWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:TWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks