General

  • Target

    JaffaCakes118_10168b35528b5a6cbee4b6e1bdda9c07540f52792e9676a5ff78ff49375dee67

  • Size

    171KB

  • Sample

    241230-g15bns1ja1

  • MD5

    1a6b8842a3d38559f50c8c026fd4cc9e

  • SHA1

    049f2b65e377de39da87f448e879111f672830be

  • SHA256

    10168b35528b5a6cbee4b6e1bdda9c07540f52792e9676a5ff78ff49375dee67

  • SHA512

    b3b258b630095d9c5a64f7f27b1145b8ce895bb0f30a0c0b909bd7e7ec733732e2ac26600ba88cca2b818e3644ae51173a71efd7c8886ca911ded91be772c425

  • SSDEEP

    3072:Oi49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:OH9RVaPEmsdHdbQUbd2H3

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

128.199.200.38:443

192.163.233.216:6601

43.229.206.244:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_10168b35528b5a6cbee4b6e1bdda9c07540f52792e9676a5ff78ff49375dee67

    • Size

      171KB

    • MD5

      1a6b8842a3d38559f50c8c026fd4cc9e

    • SHA1

      049f2b65e377de39da87f448e879111f672830be

    • SHA256

      10168b35528b5a6cbee4b6e1bdda9c07540f52792e9676a5ff78ff49375dee67

    • SHA512

      b3b258b630095d9c5a64f7f27b1145b8ce895bb0f30a0c0b909bd7e7ec733732e2ac26600ba88cca2b818e3644ae51173a71efd7c8886ca911ded91be772c425

    • SSDEEP

      3072:Oi49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:OH9RVaPEmsdHdbQUbd2H3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks