General

  • Target

    JaffaCakes118_5abe58c707793b25509e424a0c196b72233f39344e2ec51316ec49b54f3b9ba6

  • Size

    161KB

  • Sample

    241230-xhgqnatmel

  • MD5

    0f8d5e6f8e1e3458c497912562e16f37

  • SHA1

    4a8115d73c0f0622e9b21b5e92d008e629e0b772

  • SHA256

    5abe58c707793b25509e424a0c196b72233f39344e2ec51316ec49b54f3b9ba6

  • SHA512

    d14b3b52e883cac38471d07b02e55a0be4995b00e9a1c654e7da470f047bdf558d4b2302c65bf72b93beb83b403f355916bd809c5f48164b7a1446a99ef4c906

  • SSDEEP

    3072:6k2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Yp8AF:cG3rUvoU4JE/Wzan9T7B/CKsL/Yy

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

193.200.130.181:443

95.138.161.226:2303

167.114.113.13:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5abe58c707793b25509e424a0c196b72233f39344e2ec51316ec49b54f3b9ba6

    • Size

      161KB

    • MD5

      0f8d5e6f8e1e3458c497912562e16f37

    • SHA1

      4a8115d73c0f0622e9b21b5e92d008e629e0b772

    • SHA256

      5abe58c707793b25509e424a0c196b72233f39344e2ec51316ec49b54f3b9ba6

    • SHA512

      d14b3b52e883cac38471d07b02e55a0be4995b00e9a1c654e7da470f047bdf558d4b2302c65bf72b93beb83b403f355916bd809c5f48164b7a1446a99ef4c906

    • SSDEEP

      3072:6k2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Yp8AF:cG3rUvoU4JE/Wzan9T7B/CKsL/Yy

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks