General

  • Target

    JaffaCakes118_7d64dc089730885d990276c975a6e49a7b6a5ee878634954e4050a0ba52d4345

  • Size

    170KB

  • Sample

    241230-3mg5waxjew

  • MD5

    9ccec2bdfbd3e2f62a73636facbd3fce

  • SHA1

    015c8e44b191742307b2326f9ed1041cddd07f7c

  • SHA256

    7d64dc089730885d990276c975a6e49a7b6a5ee878634954e4050a0ba52d4345

  • SHA512

    a3d29e6e3b6d1fe8b445fe0c0d256ecee75e2395d604fbbc6efbcf4989bf1d124d9fddd60c6583e177ed754eeaf96249c80c531bbf48e23bb8f72da3d66f3e67

  • SSDEEP

    3072:oV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:oV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7d64dc089730885d990276c975a6e49a7b6a5ee878634954e4050a0ba52d4345

    • Size

      170KB

    • MD5

      9ccec2bdfbd3e2f62a73636facbd3fce

    • SHA1

      015c8e44b191742307b2326f9ed1041cddd07f7c

    • SHA256

      7d64dc089730885d990276c975a6e49a7b6a5ee878634954e4050a0ba52d4345

    • SHA512

      a3d29e6e3b6d1fe8b445fe0c0d256ecee75e2395d604fbbc6efbcf4989bf1d124d9fddd60c6583e177ed754eeaf96249c80c531bbf48e23bb8f72da3d66f3e67

    • SSDEEP

      3072:oV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:oV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks