General

  • Target

    JaffaCakes118_7de17550ebcfb7a3bda19107c3b221ce3cd1ca6b4ec26ef1ea61c2338f428fce

  • Size

    172KB

  • Sample

    241230-yqcmcaypaz

  • MD5

    a28ab3ca04b0e76a64935a2156dec4d7

  • SHA1

    0414f4b74e4b2f0ec5275e3e65cc17d764501d2a

  • SHA256

    7de17550ebcfb7a3bda19107c3b221ce3cd1ca6b4ec26ef1ea61c2338f428fce

  • SHA512

    1cc6719830fa69543d0c8bdeb22e9af8b6fc6cf66d74de849b9d23254bc18c36f6edc74c407042a8041c211e722438d553692230aa40f3753503b8e0d7ffb9c1

  • SSDEEP

    3072:eWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:eWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7de17550ebcfb7a3bda19107c3b221ce3cd1ca6b4ec26ef1ea61c2338f428fce

    • Size

      172KB

    • MD5

      a28ab3ca04b0e76a64935a2156dec4d7

    • SHA1

      0414f4b74e4b2f0ec5275e3e65cc17d764501d2a

    • SHA256

      7de17550ebcfb7a3bda19107c3b221ce3cd1ca6b4ec26ef1ea61c2338f428fce

    • SHA512

      1cc6719830fa69543d0c8bdeb22e9af8b6fc6cf66d74de849b9d23254bc18c36f6edc74c407042a8041c211e722438d553692230aa40f3753503b8e0d7ffb9c1

    • SSDEEP

      3072:eWpY/Syz2ita3Un6oaxewXvR2GNYHj8z+7/VczU9vh46WIOY4zmo3zAGW+r:eWpY/S8Z83VewfR2GyxVcA5hvjRCmikG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks