General

  • Target

    JaffaCakes118_f3fbe6d73f8be31d2b81edd72e81cfcb02939d070a862fafca9d32a5a30bcabb

  • Size

    163KB

  • Sample

    241223-184jwstjhy

  • MD5

    70c5a52574372ee7287de0bdb002c6b6

  • SHA1

    bf188ccc9e85ab2a3c76eb8923c8c25d620c6ba4

  • SHA256

    f3fbe6d73f8be31d2b81edd72e81cfcb02939d070a862fafca9d32a5a30bcabb

  • SHA512

    de2be0d7558fe3b9b0a86e099c3723ee957aa1f12f9ed5ebeb5d81b68edd9f39ac8fd5886fe7cdcd25a365d1194a9a99245823e10233fcd9576267f9029098c0

  • SSDEEP

    3072:99F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:99F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f3fbe6d73f8be31d2b81edd72e81cfcb02939d070a862fafca9d32a5a30bcabb

    • Size

      163KB

    • MD5

      70c5a52574372ee7287de0bdb002c6b6

    • SHA1

      bf188ccc9e85ab2a3c76eb8923c8c25d620c6ba4

    • SHA256

      f3fbe6d73f8be31d2b81edd72e81cfcb02939d070a862fafca9d32a5a30bcabb

    • SHA512

      de2be0d7558fe3b9b0a86e099c3723ee957aa1f12f9ed5ebeb5d81b68edd9f39ac8fd5886fe7cdcd25a365d1194a9a99245823e10233fcd9576267f9029098c0

    • SSDEEP

      3072:99F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:99F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks