General

  • Target

    JaffaCakes118_73ec6ac91e991176e323883be16365a82c8ff2aaa6576d51c790c8aee720049c

  • Size

    167KB

  • Sample

    241230-xrk5fatqcp

  • MD5

    ea9ba72bf56987e56513ff022b080588

  • SHA1

    b7314daf8c05802c645b3aaadf593240630d10f7

  • SHA256

    73ec6ac91e991176e323883be16365a82c8ff2aaa6576d51c790c8aee720049c

  • SHA512

    75654e0e6ae3ae03e4675df6f21607adddc7ca08e4e10ec87359fd02c509186c1a0c456cdc20ad0c09dde76c053c7c0191e408630da3c3fed5cfa4d73398b28b

  • SSDEEP

    3072:ehG/TPp+AgPbdXnx6ZBfPG6+Xo4Y63F35oJq3Kco08AQazELZn+1qPrx6/idKI:LERMVPG6+Y63HoG1QawL40Prx6KoI

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_73ec6ac91e991176e323883be16365a82c8ff2aaa6576d51c790c8aee720049c

    • Size

      167KB

    • MD5

      ea9ba72bf56987e56513ff022b080588

    • SHA1

      b7314daf8c05802c645b3aaadf593240630d10f7

    • SHA256

      73ec6ac91e991176e323883be16365a82c8ff2aaa6576d51c790c8aee720049c

    • SHA512

      75654e0e6ae3ae03e4675df6f21607adddc7ca08e4e10ec87359fd02c509186c1a0c456cdc20ad0c09dde76c053c7c0191e408630da3c3fed5cfa4d73398b28b

    • SSDEEP

      3072:ehG/TPp+AgPbdXnx6ZBfPG6+Xo4Y63F35oJq3Kco08AQazELZn+1qPrx6/idKI:LERMVPG6+Y63HoG1QawL40Prx6KoI

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks