General

  • Target

    JaffaCakes118_02eff04fff538cf4c79288ec9691d92368ad49c2f94090462162adea73c5369c

  • Size

    162KB

  • Sample

    241222-l6xw1atrfr

  • MD5

    93e29efdceb0ba8aeaf7526790965e2d

  • SHA1

    da472fcc336c42a2c37a6e252fcb74c4b3e30570

  • SHA256

    02eff04fff538cf4c79288ec9691d92368ad49c2f94090462162adea73c5369c

  • SHA512

    f2b0dfd416838f4f71055ab3d82f93596194c3f88d6d5905df02daa217aa24171c4d00a26e0cc296ecd12548d2f21b73f695c140b738e4afa24b2b8e918966b5

  • SSDEEP

    3072:6esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:M4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_02eff04fff538cf4c79288ec9691d92368ad49c2f94090462162adea73c5369c

    • Size

      162KB

    • MD5

      93e29efdceb0ba8aeaf7526790965e2d

    • SHA1

      da472fcc336c42a2c37a6e252fcb74c4b3e30570

    • SHA256

      02eff04fff538cf4c79288ec9691d92368ad49c2f94090462162adea73c5369c

    • SHA512

      f2b0dfd416838f4f71055ab3d82f93596194c3f88d6d5905df02daa217aa24171c4d00a26e0cc296ecd12548d2f21b73f695c140b738e4afa24b2b8e918966b5

    • SSDEEP

      3072:6esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:M4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks