General

  • Target

    JaffaCakes118_41f61e78280f628a3d89d870487fbdd86f6d2c5bd27a38dd6edb775bd80f4325

  • Size

    163KB

  • Sample

    241221-xhpq9swqgj

  • MD5

    a930d7aa649808a2f2d3f5db42a79980

  • SHA1

    50f433bfca0345ba18e5ae20ca1c0d0a451fbb3b

  • SHA256

    41f61e78280f628a3d89d870487fbdd86f6d2c5bd27a38dd6edb775bd80f4325

  • SHA512

    c7732ed90746cf683930f060d2c870980cb9f40c75577d5ed50e0c9f75cee8cedf9e74ccb3508bdec0452f2e60264ff3368f1014e5498b803c60d190638eb646

  • SSDEEP

    3072:Aar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:6s4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_41f61e78280f628a3d89d870487fbdd86f6d2c5bd27a38dd6edb775bd80f4325

    • Size

      163KB

    • MD5

      a930d7aa649808a2f2d3f5db42a79980

    • SHA1

      50f433bfca0345ba18e5ae20ca1c0d0a451fbb3b

    • SHA256

      41f61e78280f628a3d89d870487fbdd86f6d2c5bd27a38dd6edb775bd80f4325

    • SHA512

      c7732ed90746cf683930f060d2c870980cb9f40c75577d5ed50e0c9f75cee8cedf9e74ccb3508bdec0452f2e60264ff3368f1014e5498b803c60d190638eb646

    • SSDEEP

      3072:Aar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:6s4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks