General

  • Target

    JaffaCakes118_38766cbbdaa7c95de525a34369c0d5df52bf7a683596b3926b728bbc9c038d43

  • Size

    164KB

  • Sample

    241230-3tsj7axna1

  • MD5

    0825b160d9106be43d2e5a79bd06c1d2

  • SHA1

    a1da075d6f187ec5037a3795a26ae04f8e31fc19

  • SHA256

    38766cbbdaa7c95de525a34369c0d5df52bf7a683596b3926b728bbc9c038d43

  • SHA512

    a5ddbdd62e04a8c5e62ee846fbf579e19c112a425fe182f98326cf50930be52f112a59ca7606ebccbf1afdc758a8e0c129e26170124ad291efc4c122f9d2e05d

  • SSDEEP

    3072:6BefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:6Befiv/12+2A1AIpFzxCtNjHSoPm11J

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.123.40.54:443

82.209.17.209:8172

180.250.21.2:13721

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_38766cbbdaa7c95de525a34369c0d5df52bf7a683596b3926b728bbc9c038d43

    • Size

      164KB

    • MD5

      0825b160d9106be43d2e5a79bd06c1d2

    • SHA1

      a1da075d6f187ec5037a3795a26ae04f8e31fc19

    • SHA256

      38766cbbdaa7c95de525a34369c0d5df52bf7a683596b3926b728bbc9c038d43

    • SHA512

      a5ddbdd62e04a8c5e62ee846fbf579e19c112a425fe182f98326cf50930be52f112a59ca7606ebccbf1afdc758a8e0c129e26170124ad291efc4c122f9d2e05d

    • SSDEEP

      3072:6BefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:6Befiv/12+2A1AIpFzxCtNjHSoPm11J

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks