General

  • Target

    JaffaCakes118_077af70c44a1cc5a2d50c790c36d95003ffc52c8b5c9a7959215d5cbb2a8d17b

  • Size

    163KB

  • Sample

    241222-ldjtnssndw

  • MD5

    55e62e42e54d26edf39d8309a342a5b1

  • SHA1

    78e62e73e99653938169f3c7b81116d48186c99f

  • SHA256

    077af70c44a1cc5a2d50c790c36d95003ffc52c8b5c9a7959215d5cbb2a8d17b

  • SHA512

    ea2b6d28de7ab5db2253cdc03bf03c939294310d8a6614d70ee62bb0361b06984b75bb19ed3e3568415e98f6d2d81bb3b32a88cd2df9b8da953464c5e35dc81c

  • SSDEEP

    3072:Zar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Ds4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_077af70c44a1cc5a2d50c790c36d95003ffc52c8b5c9a7959215d5cbb2a8d17b

    • Size

      163KB

    • MD5

      55e62e42e54d26edf39d8309a342a5b1

    • SHA1

      78e62e73e99653938169f3c7b81116d48186c99f

    • SHA256

      077af70c44a1cc5a2d50c790c36d95003ffc52c8b5c9a7959215d5cbb2a8d17b

    • SHA512

      ea2b6d28de7ab5db2253cdc03bf03c939294310d8a6614d70ee62bb0361b06984b75bb19ed3e3568415e98f6d2d81bb3b32a88cd2df9b8da953464c5e35dc81c

    • SSDEEP

      3072:Zar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Ds4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks