General

  • Target

    JaffaCakes118_05df8c924aa669c2bb436d3e2b778ffc4e6f44580871b9d01bd5a0b37a0b7bed

  • Size

    170KB

  • Sample

    241230-x2vrmavlbk

  • MD5

    57f0764eb09605a17d2a47d5c5c19fce

  • SHA1

    1fbadaff3bee5684c227e4d74f1623c98b0dfe99

  • SHA256

    05df8c924aa669c2bb436d3e2b778ffc4e6f44580871b9d01bd5a0b37a0b7bed

  • SHA512

    f870c95fb1e96f7e77629ec118ec88414f1f94fa9af22886f6e34c2ee7a78fe4d28ca0936310b50c0cfb731af629662f3e2b37116afb733ff6b787477cab3d20

  • SSDEEP

    3072:eV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:eV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_05df8c924aa669c2bb436d3e2b778ffc4e6f44580871b9d01bd5a0b37a0b7bed

    • Size

      170KB

    • MD5

      57f0764eb09605a17d2a47d5c5c19fce

    • SHA1

      1fbadaff3bee5684c227e4d74f1623c98b0dfe99

    • SHA256

      05df8c924aa669c2bb436d3e2b778ffc4e6f44580871b9d01bd5a0b37a0b7bed

    • SHA512

      f870c95fb1e96f7e77629ec118ec88414f1f94fa9af22886f6e34c2ee7a78fe4d28ca0936310b50c0cfb731af629662f3e2b37116afb733ff6b787477cab3d20

    • SSDEEP

      3072:eV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:eV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks