General

  • Target

    JaffaCakes118_8fb6961e7e63f91be6eaab0568855db1ca69fce0118c476c0e71d7f109b48e73

  • Size

    172KB

  • Sample

    241230-2r3rpssmhm

  • MD5

    7ef1b9260e64fa5c9cdc1b10ca07983e

  • SHA1

    608a2ae1686463bdb10efbab8293f4e06982c0e5

  • SHA256

    8fb6961e7e63f91be6eaab0568855db1ca69fce0118c476c0e71d7f109b48e73

  • SHA512

    1d751a6cea567ff0d433a64cb344710b90d4b7978bf27f6ea2a9b2707c1f0200e51af187dab41554975b0fe324da27183898a99f0486704fb33a0d607314ed08

  • SSDEEP

    3072:AWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:AWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8fb6961e7e63f91be6eaab0568855db1ca69fce0118c476c0e71d7f109b48e73

    • Size

      172KB

    • MD5

      7ef1b9260e64fa5c9cdc1b10ca07983e

    • SHA1

      608a2ae1686463bdb10efbab8293f4e06982c0e5

    • SHA256

      8fb6961e7e63f91be6eaab0568855db1ca69fce0118c476c0e71d7f109b48e73

    • SHA512

      1d751a6cea567ff0d433a64cb344710b90d4b7978bf27f6ea2a9b2707c1f0200e51af187dab41554975b0fe324da27183898a99f0486704fb33a0d607314ed08

    • SSDEEP

      3072:AWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:AWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks