General

  • Target

    JaffaCakes118_77ea98fa1f9cb843d91ad39443930044601db7ca56103997e582b078920916ee

  • Size

    172KB

  • Sample

    241230-e2c8gaxrf1

  • MD5

    b58ec5beac224a6fc818d8be38c4bd8e

  • SHA1

    f88ce9a31ad0674ac70389c1a9a1fc2e04f07b3a

  • SHA256

    77ea98fa1f9cb843d91ad39443930044601db7ca56103997e582b078920916ee

  • SHA512

    7f50c5b5ea2b305adf68a1cc8f37bf9bccaf0cb15f9fdc27d529db3af4e33012fc566affcfb0fb6348946463dc1c74f673906e7ca47e7bbf58fa7d3e1084cf02

  • SSDEEP

    3072:0WpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:0WpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_77ea98fa1f9cb843d91ad39443930044601db7ca56103997e582b078920916ee

    • Size

      172KB

    • MD5

      b58ec5beac224a6fc818d8be38c4bd8e

    • SHA1

      f88ce9a31ad0674ac70389c1a9a1fc2e04f07b3a

    • SHA256

      77ea98fa1f9cb843d91ad39443930044601db7ca56103997e582b078920916ee

    • SHA512

      7f50c5b5ea2b305adf68a1cc8f37bf9bccaf0cb15f9fdc27d529db3af4e33012fc566affcfb0fb6348946463dc1c74f673906e7ca47e7bbf58fa7d3e1084cf02

    • SSDEEP

      3072:0WpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:0WpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks