General

  • Target

    JaffaCakes118_379bed56882c63344d085a8d81a46f7189b0cd752e22578060c07e1d3123dc4f

  • Size

    172KB

  • Sample

    241230-vr3nda1jbr

  • MD5

    d1bebbb35cd9b835177f09c9502f14d9

  • SHA1

    2b92b19d6f56cf13c509a74c3020403740dd1fac

  • SHA256

    379bed56882c63344d085a8d81a46f7189b0cd752e22578060c07e1d3123dc4f

  • SHA512

    f912e9fd977f312a34c277b7c364dd0226baa06e4d088de3a1d4907e4309c977799ac47cf316415c6f1aeee77d10b46b806da6748dcff1df0515b58ef6fb6dbb

  • SSDEEP

    3072:yWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:yWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_379bed56882c63344d085a8d81a46f7189b0cd752e22578060c07e1d3123dc4f

    • Size

      172KB

    • MD5

      d1bebbb35cd9b835177f09c9502f14d9

    • SHA1

      2b92b19d6f56cf13c509a74c3020403740dd1fac

    • SHA256

      379bed56882c63344d085a8d81a46f7189b0cd752e22578060c07e1d3123dc4f

    • SHA512

      f912e9fd977f312a34c277b7c364dd0226baa06e4d088de3a1d4907e4309c977799ac47cf316415c6f1aeee77d10b46b806da6748dcff1df0515b58ef6fb6dbb

    • SSDEEP

      3072:yWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:yWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks