General

  • Target

    JaffaCakes118_c22bf911abc5ccf11ca97c9b344a42682bb393270a7dd7b045ec728bc5f5f9f7

  • Size

    172KB

  • Sample

    241230-fbv62aylfj

  • MD5

    67568b435572ca6cae2626563803ad75

  • SHA1

    73f21320049462824bf8ea308368c580afc73e27

  • SHA256

    c22bf911abc5ccf11ca97c9b344a42682bb393270a7dd7b045ec728bc5f5f9f7

  • SHA512

    3cd0c681513b71311e01533a43c8992eff26cf2cd0ca4acaabf240e77faee281f9cdbdb2324f267e2b2961636ff119c8057605c8257f94b7dca1d4c48c8d9f30

  • SSDEEP

    3072:kWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:kWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c22bf911abc5ccf11ca97c9b344a42682bb393270a7dd7b045ec728bc5f5f9f7

    • Size

      172KB

    • MD5

      67568b435572ca6cae2626563803ad75

    • SHA1

      73f21320049462824bf8ea308368c580afc73e27

    • SHA256

      c22bf911abc5ccf11ca97c9b344a42682bb393270a7dd7b045ec728bc5f5f9f7

    • SHA512

      3cd0c681513b71311e01533a43c8992eff26cf2cd0ca4acaabf240e77faee281f9cdbdb2324f267e2b2961636ff119c8057605c8257f94b7dca1d4c48c8d9f30

    • SSDEEP

      3072:kWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:kWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks