General

  • Target

    JaffaCakes118_01d8df3b4583015c3056e9ebd49f4ce0e95b5c31df41ba6c7042bd38ffb7e9d3

  • Size

    170KB

  • Sample

    241230-eacsmaxkek

  • MD5

    224ff40a5b84700553549cd8a0c08889

  • SHA1

    2ddfa8cb2912ca00e76206ebd8c13e0e7fca31d1

  • SHA256

    01d8df3b4583015c3056e9ebd49f4ce0e95b5c31df41ba6c7042bd38ffb7e9d3

  • SHA512

    21ec75ee458b0f37ae22300e0e4d111ba5470a88b7c469be4fec2f2bfdd970581998a08a040bf61ffb508c6472735a899c1a36b3d4e3c851f9c104a4c6c22157

  • SSDEEP

    3072:OV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:OV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_01d8df3b4583015c3056e9ebd49f4ce0e95b5c31df41ba6c7042bd38ffb7e9d3

    • Size

      170KB

    • MD5

      224ff40a5b84700553549cd8a0c08889

    • SHA1

      2ddfa8cb2912ca00e76206ebd8c13e0e7fca31d1

    • SHA256

      01d8df3b4583015c3056e9ebd49f4ce0e95b5c31df41ba6c7042bd38ffb7e9d3

    • SHA512

      21ec75ee458b0f37ae22300e0e4d111ba5470a88b7c469be4fec2f2bfdd970581998a08a040bf61ffb508c6472735a899c1a36b3d4e3c851f9c104a4c6c22157

    • SSDEEP

      3072:OV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:OV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks