General

  • Target

    JaffaCakes118_19e4454da37adbfc0084abf75661446224f0c34588af07772887a7b36c8741cd

  • Size

    160KB

  • Sample

    241230-3sgrasxmdt

  • MD5

    8b0fe274da593d3b7cb8a0f9aef21ebc

  • SHA1

    9d61d165c778a0f4f9c5ebcf093eedb58dd3f86b

  • SHA256

    19e4454da37adbfc0084abf75661446224f0c34588af07772887a7b36c8741cd

  • SHA512

    76ff7a23609154cfc2ecbe5e4bd59a3a46b0e94a3994453c904e08f72e36aa14a63996b76a22466f8ff014e350655cefdec6eb9dc058b7f09695a285f3ea964d

  • SSDEEP

    3072:HaOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:n8mnT7Fmsans1+0Hw7/t

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

185.148.168.240:443

162.216.125.131:2303

193.200.130.178:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_19e4454da37adbfc0084abf75661446224f0c34588af07772887a7b36c8741cd

    • Size

      160KB

    • MD5

      8b0fe274da593d3b7cb8a0f9aef21ebc

    • SHA1

      9d61d165c778a0f4f9c5ebcf093eedb58dd3f86b

    • SHA256

      19e4454da37adbfc0084abf75661446224f0c34588af07772887a7b36c8741cd

    • SHA512

      76ff7a23609154cfc2ecbe5e4bd59a3a46b0e94a3994453c904e08f72e36aa14a63996b76a22466f8ff014e350655cefdec6eb9dc058b7f09695a285f3ea964d

    • SSDEEP

      3072:HaOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:n8mnT7Fmsans1+0Hw7/t

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks