General

  • Target

    JaffaCakes118_37e80d35f0ae5c491945944e9b1179a60149d1ae78bca0d33d6eb8c560b08d26

  • Size

    172KB

  • Sample

    241230-3nwpnatrbr

  • MD5

    560c4c5b58d00b839c4bc1025dbfb8a7

  • SHA1

    22d464add6ae3ac268505196ed852442026e54f8

  • SHA256

    37e80d35f0ae5c491945944e9b1179a60149d1ae78bca0d33d6eb8c560b08d26

  • SHA512

    2e4234c11bbf1dc2022f8f41e0a1c7b893b49f5cdd7835ea3f3cb8594a14d22c1acf50dd5b885c1eb12ec6b57348896d666318463c78420e4aac7ce7f209f88b

  • SSDEEP

    3072:eWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:eWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_37e80d35f0ae5c491945944e9b1179a60149d1ae78bca0d33d6eb8c560b08d26

    • Size

      172KB

    • MD5

      560c4c5b58d00b839c4bc1025dbfb8a7

    • SHA1

      22d464add6ae3ac268505196ed852442026e54f8

    • SHA256

      37e80d35f0ae5c491945944e9b1179a60149d1ae78bca0d33d6eb8c560b08d26

    • SHA512

      2e4234c11bbf1dc2022f8f41e0a1c7b893b49f5cdd7835ea3f3cb8594a14d22c1acf50dd5b885c1eb12ec6b57348896d666318463c78420e4aac7ce7f209f88b

    • SSDEEP

      3072:eWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:eWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks