General

  • Target

    JaffaCakes118_5d54d55c2260c125a35a94ace5be06114b0dec9ce1b543b1c9139fb6a43cc119

  • Size

    172KB

  • Sample

    241230-3t7n4sxncy

  • MD5

    4a61aae80a7800e95c332c395e1f2e1d

  • SHA1

    b913970d8748310ca8d822287780e46a0d797a07

  • SHA256

    5d54d55c2260c125a35a94ace5be06114b0dec9ce1b543b1c9139fb6a43cc119

  • SHA512

    765b8f8a3a4756053bbbdfe3bb415ca5a8d996572813fad7f83931c7b6568f7e59cc8395473402e7cd06b18187e23b77082ea134263b55cb0d603d51bbfe438b

  • SSDEEP

    3072:WWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:WWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5d54d55c2260c125a35a94ace5be06114b0dec9ce1b543b1c9139fb6a43cc119

    • Size

      172KB

    • MD5

      4a61aae80a7800e95c332c395e1f2e1d

    • SHA1

      b913970d8748310ca8d822287780e46a0d797a07

    • SHA256

      5d54d55c2260c125a35a94ace5be06114b0dec9ce1b543b1c9139fb6a43cc119

    • SHA512

      765b8f8a3a4756053bbbdfe3bb415ca5a8d996572813fad7f83931c7b6568f7e59cc8395473402e7cd06b18187e23b77082ea134263b55cb0d603d51bbfe438b

    • SSDEEP

      3072:WWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:WWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks