General

  • Target

    JaffaCakes118_cd640218c1477bbfafacecf5d57b9c5728ad2e620db37c5e4586abef0b4b0229

  • Size

    170KB

  • Sample

    241230-w3qzdsvqfw

  • MD5

    d8103e6373b1655af0decdb9eff2cc56

  • SHA1

    7620bf0eb3793b248d5d9b0c80ee8c8c0c1b0c1d

  • SHA256

    cd640218c1477bbfafacecf5d57b9c5728ad2e620db37c5e4586abef0b4b0229

  • SHA512

    9e62b39127b15f807436dc39e35cb94656ccc0dc0e8607951ffd7e9a32a649818a6caf9aa8cb261a4c428b8799576bdd890e5e728b936c52ad44b1a173a418c8

  • SSDEEP

    3072:cV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:cV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cd640218c1477bbfafacecf5d57b9c5728ad2e620db37c5e4586abef0b4b0229

    • Size

      170KB

    • MD5

      d8103e6373b1655af0decdb9eff2cc56

    • SHA1

      7620bf0eb3793b248d5d9b0c80ee8c8c0c1b0c1d

    • SHA256

      cd640218c1477bbfafacecf5d57b9c5728ad2e620db37c5e4586abef0b4b0229

    • SHA512

      9e62b39127b15f807436dc39e35cb94656ccc0dc0e8607951ffd7e9a32a649818a6caf9aa8cb261a4c428b8799576bdd890e5e728b936c52ad44b1a173a418c8

    • SSDEEP

      3072:cV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:cV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks