General

  • Target

    JaffaCakes118_21f387c86cccba3ab85f7d287bbeb1ff69c03f785b8b5c50dc52ca471f2162f9

  • Size

    166KB

  • Sample

    241230-xzbkzaxlas

  • MD5

    133d5ff3a7802d6fceca42701357bdb1

  • SHA1

    a3020b62d78ccb2d9b3c7dd4f2aa8ff3ef5a9534

  • SHA256

    21f387c86cccba3ab85f7d287bbeb1ff69c03f785b8b5c50dc52ca471f2162f9

  • SHA512

    103e366a6ac0dc70808d313faa6a4461201c78fdb51e866e1c719c74690f1be2be867bbf9b001ab0634d1922cc6ded9c28c35b8d7727efc9ca06e41b543768ec

  • SSDEEP

    3072:euFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:e0czbty9uiaJlHE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_21f387c86cccba3ab85f7d287bbeb1ff69c03f785b8b5c50dc52ca471f2162f9

    • Size

      166KB

    • MD5

      133d5ff3a7802d6fceca42701357bdb1

    • SHA1

      a3020b62d78ccb2d9b3c7dd4f2aa8ff3ef5a9534

    • SHA256

      21f387c86cccba3ab85f7d287bbeb1ff69c03f785b8b5c50dc52ca471f2162f9

    • SHA512

      103e366a6ac0dc70808d313faa6a4461201c78fdb51e866e1c719c74690f1be2be867bbf9b001ab0634d1922cc6ded9c28c35b8d7727efc9ca06e41b543768ec

    • SSDEEP

      3072:euFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:e0czbty9uiaJlHE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks