General

  • Target

    JaffaCakes118_4a2663bcd4e0fb5837b1fc18f682a2dfd056e86f0cb48d294345fa38f0544cf7

  • Size

    171KB

  • Sample

    241230-e1d4daxres

  • MD5

    7148c3169b558f490b4e047726590fb7

  • SHA1

    fdcda1f82de38eadd130470fb1d41d677b1d917d

  • SHA256

    4a2663bcd4e0fb5837b1fc18f682a2dfd056e86f0cb48d294345fa38f0544cf7

  • SHA512

    2a59dbc688622d973b4dbab7b9a881524f51c2375557c2bbd148af34052888ffa6a88716afec52786b39fe38b0ebf16bee696664c3fbb0483fced328be0aa4f1

  • SSDEEP

    3072:0i49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:0H9RVaPEmsdHdbQUbd2H3

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

128.199.200.38:443

192.163.233.216:6601

43.229.206.244:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4a2663bcd4e0fb5837b1fc18f682a2dfd056e86f0cb48d294345fa38f0544cf7

    • Size

      171KB

    • MD5

      7148c3169b558f490b4e047726590fb7

    • SHA1

      fdcda1f82de38eadd130470fb1d41d677b1d917d

    • SHA256

      4a2663bcd4e0fb5837b1fc18f682a2dfd056e86f0cb48d294345fa38f0544cf7

    • SHA512

      2a59dbc688622d973b4dbab7b9a881524f51c2375557c2bbd148af34052888ffa6a88716afec52786b39fe38b0ebf16bee696664c3fbb0483fced328be0aa4f1

    • SSDEEP

      3072:0i49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:0H9RVaPEmsdHdbQUbd2H3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks