General

  • Target

    JaffaCakes118_be144f5fe271242569ae2b8e02835fb67157743a88756a95d9fa660067320381

  • Size

    160KB

  • Sample

    241230-v778ss1ngp

  • MD5

    0d37434b90bb88ed7a5a830b40ad1758

  • SHA1

    d5b16ede77ab889d4e2cb6108c248b719dba5266

  • SHA256

    be144f5fe271242569ae2b8e02835fb67157743a88756a95d9fa660067320381

  • SHA512

    9de7d9df7935fa0bdb6d661824aa9bfcc196b36c2ea7103dfbf20f395f5c22e506c00b7b8aa42db626c5aac1bd066a2c59a6396970f7eb234260bb47db67606c

  • SSDEEP

    3072:AXhVKBnUkeWA2/9JQMxWlSvZVljKwTTtCwV4W8fikW5SQnZ:Ai2PY9JQMo6nljK2TQ8kmL

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

193.200.130.181:443

95.138.161.226:2303

167.114.113.13:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_be144f5fe271242569ae2b8e02835fb67157743a88756a95d9fa660067320381

    • Size

      160KB

    • MD5

      0d37434b90bb88ed7a5a830b40ad1758

    • SHA1

      d5b16ede77ab889d4e2cb6108c248b719dba5266

    • SHA256

      be144f5fe271242569ae2b8e02835fb67157743a88756a95d9fa660067320381

    • SHA512

      9de7d9df7935fa0bdb6d661824aa9bfcc196b36c2ea7103dfbf20f395f5c22e506c00b7b8aa42db626c5aac1bd066a2c59a6396970f7eb234260bb47db67606c

    • SSDEEP

      3072:AXhVKBnUkeWA2/9JQMxWlSvZVljKwTTtCwV4W8fikW5SQnZ:Ai2PY9JQMo6nljK2TQ8kmL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks