General

  • Target

    JaffaCakes118_3ee13b12a0f3a23e2bb5830533eb03a81c433d3879f74a19818065257c72160f

  • Size

    166KB

  • Sample

    241230-2tpymasndj

  • MD5

    24dadfcd23b47c5386bddc566b69795a

  • SHA1

    e666f19a5ead6bd88cfa53c356c98bb02cf24238

  • SHA256

    3ee13b12a0f3a23e2bb5830533eb03a81c433d3879f74a19818065257c72160f

  • SHA512

    0dc49337badfc9248cc00dc4d94cfadf33f4e001a77e144db68988695a5cc39f6bce773f226a510d8bc868797bb95bef2142c6d2ba4b0c9e4dea6653f2dafe68

  • SSDEEP

    3072:XuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:X0czbty9uiaJlHE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3ee13b12a0f3a23e2bb5830533eb03a81c433d3879f74a19818065257c72160f

    • Size

      166KB

    • MD5

      24dadfcd23b47c5386bddc566b69795a

    • SHA1

      e666f19a5ead6bd88cfa53c356c98bb02cf24238

    • SHA256

      3ee13b12a0f3a23e2bb5830533eb03a81c433d3879f74a19818065257c72160f

    • SHA512

      0dc49337badfc9248cc00dc4d94cfadf33f4e001a77e144db68988695a5cc39f6bce773f226a510d8bc868797bb95bef2142c6d2ba4b0c9e4dea6653f2dafe68

    • SSDEEP

      3072:XuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:X0czbty9uiaJlHE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks