General

  • Target

    JaffaCakes118_fe784206c5b31a4c91bec2e54bb91904f27f37a42cd67623e3497edf96ac721a

  • Size

    162KB

  • Sample

    241222-gb7qhawmbn

  • MD5

    17d18d4bbb585fbf03b8a6a17b8b4049

  • SHA1

    7db22789b57ac9e65fdb7254fd4fa98eab34a315

  • SHA256

    fe784206c5b31a4c91bec2e54bb91904f27f37a42cd67623e3497edf96ac721a

  • SHA512

    a106373e5be495e9bf2e36be246ed8305e07da6f10e788c8bc6b3f37a0c5138e1b582dd66042aced48cfb71c4cd50f61465eb0ed2e1c2603024b08ee2e5e6d18

  • SSDEEP

    3072:Tesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:n4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fe784206c5b31a4c91bec2e54bb91904f27f37a42cd67623e3497edf96ac721a

    • Size

      162KB

    • MD5

      17d18d4bbb585fbf03b8a6a17b8b4049

    • SHA1

      7db22789b57ac9e65fdb7254fd4fa98eab34a315

    • SHA256

      fe784206c5b31a4c91bec2e54bb91904f27f37a42cd67623e3497edf96ac721a

    • SHA512

      a106373e5be495e9bf2e36be246ed8305e07da6f10e788c8bc6b3f37a0c5138e1b582dd66042aced48cfb71c4cd50f61465eb0ed2e1c2603024b08ee2e5e6d18

    • SSDEEP

      3072:Tesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:n4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks