General

  • Target

    JaffaCakes118_55d120ae4eb1bf49126c743d7d2035ffbf7cd947817f1fceda0309f3f8a17a3c

  • Size

    163KB

  • Sample

    241222-w2gpbsvnby

  • MD5

    a54b6ddcfa35b21cb76d46b47a27ea92

  • SHA1

    d5b988e634f3927812b2af0c6467ff87834709d2

  • SHA256

    55d120ae4eb1bf49126c743d7d2035ffbf7cd947817f1fceda0309f3f8a17a3c

  • SHA512

    3ed4c7989156709437e73548b191f44ca45bcd3da856046b0c86a7b323f24736439e9de9506e56231a7e19213813ad91553e0c323d9face6ee1b60837dff5ccd

  • SSDEEP

    3072:Car6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:0s4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_55d120ae4eb1bf49126c743d7d2035ffbf7cd947817f1fceda0309f3f8a17a3c

    • Size

      163KB

    • MD5

      a54b6ddcfa35b21cb76d46b47a27ea92

    • SHA1

      d5b988e634f3927812b2af0c6467ff87834709d2

    • SHA256

      55d120ae4eb1bf49126c743d7d2035ffbf7cd947817f1fceda0309f3f8a17a3c

    • SHA512

      3ed4c7989156709437e73548b191f44ca45bcd3da856046b0c86a7b323f24736439e9de9506e56231a7e19213813ad91553e0c323d9face6ee1b60837dff5ccd

    • SSDEEP

      3072:Car6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:0s4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks