General

  • Target

    JaffaCakes118_3f07479dd4a3d5478928ded54decccbd34f0720c34e6af8865f3e9c4dc33cb80

  • Size

    166KB

  • Sample

    241230-yqyjtawmhp

  • MD5

    c0a89c43eda76a6ae7c597e5629d08b3

  • SHA1

    46d9f6df93f8144ae112866c3218591ec9239c1a

  • SHA256

    3f07479dd4a3d5478928ded54decccbd34f0720c34e6af8865f3e9c4dc33cb80

  • SHA512

    f2da83f8d2315695775f84bdb1444568241bcbb56f7670904cef44b492b7043bad396b66fc445b1f1928547e0273050c5d815c5df4dac2571f2fc35db9ae08ab

  • SSDEEP

    3072:AuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:A0czbty9uiaJlHE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3f07479dd4a3d5478928ded54decccbd34f0720c34e6af8865f3e9c4dc33cb80

    • Size

      166KB

    • MD5

      c0a89c43eda76a6ae7c597e5629d08b3

    • SHA1

      46d9f6df93f8144ae112866c3218591ec9239c1a

    • SHA256

      3f07479dd4a3d5478928ded54decccbd34f0720c34e6af8865f3e9c4dc33cb80

    • SHA512

      f2da83f8d2315695775f84bdb1444568241bcbb56f7670904cef44b492b7043bad396b66fc445b1f1928547e0273050c5d815c5df4dac2571f2fc35db9ae08ab

    • SSDEEP

      3072:AuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:A0czbty9uiaJlHE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks