General

  • Target

    JaffaCakes118_c90d2583e718416319a7fd1206a87c6ca19459b2e3c7fdf56d936702e94f7957

  • Size

    160KB

  • Sample

    241230-fzkefayqhv

  • MD5

    b92038689497f850e608b5a221a25aa5

  • SHA1

    8ec1ba51225f2c42f7d3762e1ef061323e394642

  • SHA256

    c90d2583e718416319a7fd1206a87c6ca19459b2e3c7fdf56d936702e94f7957

  • SHA512

    08478922a7464737805770fbe5bfa77b30009f829ac365f6c782339f85002baff4b8609fb085206e420fd25714609ccb23de943d8a4acc29429b64096f5af4d2

  • SSDEEP

    3072:GFOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:B8mnT7Fmsans1+0Hw7/t

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

185.148.168.240:443

162.216.125.131:2303

193.200.130.178:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c90d2583e718416319a7fd1206a87c6ca19459b2e3c7fdf56d936702e94f7957

    • Size

      160KB

    • MD5

      b92038689497f850e608b5a221a25aa5

    • SHA1

      8ec1ba51225f2c42f7d3762e1ef061323e394642

    • SHA256

      c90d2583e718416319a7fd1206a87c6ca19459b2e3c7fdf56d936702e94f7957

    • SHA512

      08478922a7464737805770fbe5bfa77b30009f829ac365f6c782339f85002baff4b8609fb085206e420fd25714609ccb23de943d8a4acc29429b64096f5af4d2

    • SSDEEP

      3072:GFOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:B8mnT7Fmsans1+0Hw7/t

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks