General

  • Target

    JaffaCakes118_bd848be13aa5ad7750323450c3f11830e411085d6b94dceac2c6f7ff80cdf350

  • Size

    167KB

  • Sample

    241230-vr7x4atjay

  • MD5

    7d1c4aa6d1131f192aaad83fa0ea78d8

  • SHA1

    7a5884140c44edf50d136b701e73b1d917e55f86

  • SHA256

    bd848be13aa5ad7750323450c3f11830e411085d6b94dceac2c6f7ff80cdf350

  • SHA512

    f8aa1debac01a1c420addf787f066a0238f5b56c943069caa2def5d73c4aae900b1b51b815e4ae0ac53673b4cdc361066ae4c6f08ac8680ab172f1390b265b0b

  • SSDEEP

    3072:l3G/TPp+AgPbdXnx6ZBfPG6+Xo4Y63F35oJq3Kco08AQazELZn+1qPrx6/idKz:wERMVPG6+Y63HoG1QawL40Prx6K0z

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bd848be13aa5ad7750323450c3f11830e411085d6b94dceac2c6f7ff80cdf350

    • Size

      167KB

    • MD5

      7d1c4aa6d1131f192aaad83fa0ea78d8

    • SHA1

      7a5884140c44edf50d136b701e73b1d917e55f86

    • SHA256

      bd848be13aa5ad7750323450c3f11830e411085d6b94dceac2c6f7ff80cdf350

    • SHA512

      f8aa1debac01a1c420addf787f066a0238f5b56c943069caa2def5d73c4aae900b1b51b815e4ae0ac53673b4cdc361066ae4c6f08ac8680ab172f1390b265b0b

    • SSDEEP

      3072:l3G/TPp+AgPbdXnx6ZBfPG6+Xo4Y63F35oJq3Kco08AQazELZn+1qPrx6/idKz:wERMVPG6+Y63HoG1QawL40Prx6K0z

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks