General

  • Target

    JaffaCakes118_e2ec446e0869c65d6d1e3b4ee5d14de03bc035476ce59a6af7b0a5d84079eff8

  • Size

    172KB

  • Sample

    241230-e81mcaykhq

  • MD5

    63fc613abc1b800e673676271edc14e6

  • SHA1

    65ba02319e01f0f59d55b14e50635d54d87aa5bd

  • SHA256

    e2ec446e0869c65d6d1e3b4ee5d14de03bc035476ce59a6af7b0a5d84079eff8

  • SHA512

    213b83a4600a82c93e1d36e752510f67bc987f2f4304499b0fe915b29457250b4bcc6d81494a53cfc2eb3c53a1b4246ad2ab1c1000711cd555de124212d90328

  • SSDEEP

    3072:8WpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:8WpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e2ec446e0869c65d6d1e3b4ee5d14de03bc035476ce59a6af7b0a5d84079eff8

    • Size

      172KB

    • MD5

      63fc613abc1b800e673676271edc14e6

    • SHA1

      65ba02319e01f0f59d55b14e50635d54d87aa5bd

    • SHA256

      e2ec446e0869c65d6d1e3b4ee5d14de03bc035476ce59a6af7b0a5d84079eff8

    • SHA512

      213b83a4600a82c93e1d36e752510f67bc987f2f4304499b0fe915b29457250b4bcc6d81494a53cfc2eb3c53a1b4246ad2ab1c1000711cd555de124212d90328

    • SSDEEP

      3072:8WpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:8WpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks