General

  • Target

    JaffaCakes118_f30bb6928ec6e0f6da3cbd260016d43bb3b3dca47c18c9beb56a415cd5031f65

  • Size

    160KB

  • Sample

    241230-zwsfes1nht

  • MD5

    83fc0e260ebc661a7a93e66802fba997

  • SHA1

    14264c5aeb43d91a2712e4247395d2e66353d684

  • SHA256

    f30bb6928ec6e0f6da3cbd260016d43bb3b3dca47c18c9beb56a415cd5031f65

  • SHA512

    07c8b84cdfd8d682ffb40ad0eb86b267a6a6795b292e413bed3efaedcfdec97fddd89d42e60e4984b4dfb38f5a0aec3b13a7ee93343b5542d867e1c6182359ff

  • SSDEEP

    3072:QFOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:b8mnT7Fmsans1+0Hw7/t

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

185.148.168.240:443

162.216.125.131:2303

193.200.130.178:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f30bb6928ec6e0f6da3cbd260016d43bb3b3dca47c18c9beb56a415cd5031f65

    • Size

      160KB

    • MD5

      83fc0e260ebc661a7a93e66802fba997

    • SHA1

      14264c5aeb43d91a2712e4247395d2e66353d684

    • SHA256

      f30bb6928ec6e0f6da3cbd260016d43bb3b3dca47c18c9beb56a415cd5031f65

    • SHA512

      07c8b84cdfd8d682ffb40ad0eb86b267a6a6795b292e413bed3efaedcfdec97fddd89d42e60e4984b4dfb38f5a0aec3b13a7ee93343b5542d867e1c6182359ff

    • SSDEEP

      3072:QFOn8cnYCTZouiOyPmE7Zsantih3+0wuFiD3xJaTw1tHr:b8mnT7Fmsans1+0Hw7/t

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks