General

  • Target

    JaffaCakes118_a60dadf6e774cb5237c1f808c9e0b91f21addf17a1f4b0d4f11d6a85a03e4666

  • Size

    170KB

  • Sample

    241230-eyg29axqgy

  • MD5

    53d468be0747113c086c31536b07e909

  • SHA1

    c28606683b6ae1e6e035758b411673be6cb8e45d

  • SHA256

    a60dadf6e774cb5237c1f808c9e0b91f21addf17a1f4b0d4f11d6a85a03e4666

  • SHA512

    2c631ea5377a8fed891c8a6a9a90c98884ceb7609a79000686750d2fcc1d4863a75e38b773898b93e6d58accc6e7be5899f6db4979aee1875916dc266a3cd2d1

  • SSDEEP

    3072:AV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:AV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a60dadf6e774cb5237c1f808c9e0b91f21addf17a1f4b0d4f11d6a85a03e4666

    • Size

      170KB

    • MD5

      53d468be0747113c086c31536b07e909

    • SHA1

      c28606683b6ae1e6e035758b411673be6cb8e45d

    • SHA256

      a60dadf6e774cb5237c1f808c9e0b91f21addf17a1f4b0d4f11d6a85a03e4666

    • SHA512

      2c631ea5377a8fed891c8a6a9a90c98884ceb7609a79000686750d2fcc1d4863a75e38b773898b93e6d58accc6e7be5899f6db4979aee1875916dc266a3cd2d1

    • SSDEEP

      3072:AV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:AV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks