General

  • Target

    JaffaCakes118_4f80f9ad80f7e72239e4ea97b2a62c222d8fea71e1652a8706683874acdc2741

  • Size

    162KB

  • Sample

    241223-1ag81asjej

  • MD5

    7c63b6e41d8bb220ae91ba0648c8e08f

  • SHA1

    b029384fd337e1fe0935872392ecf024b79ef6bd

  • SHA256

    4f80f9ad80f7e72239e4ea97b2a62c222d8fea71e1652a8706683874acdc2741

  • SHA512

    4c91f241be3b0c161dec59637e7240ce74189f0273138a604bb27288af9d89d4311bfc1f6d08f1ce57d235e7831cc127ee407957a96cf9473c742fe028d1b542

  • SSDEEP

    3072:m/FbrEzD9N+RiMB00c9/74DXE+JgaV7IPx+e6O/pPtaL02:cbrE1kvcB74DXZ2MelZ2

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4f80f9ad80f7e72239e4ea97b2a62c222d8fea71e1652a8706683874acdc2741

    • Size

      162KB

    • MD5

      7c63b6e41d8bb220ae91ba0648c8e08f

    • SHA1

      b029384fd337e1fe0935872392ecf024b79ef6bd

    • SHA256

      4f80f9ad80f7e72239e4ea97b2a62c222d8fea71e1652a8706683874acdc2741

    • SHA512

      4c91f241be3b0c161dec59637e7240ce74189f0273138a604bb27288af9d89d4311bfc1f6d08f1ce57d235e7831cc127ee407957a96cf9473c742fe028d1b542

    • SSDEEP

      3072:m/FbrEzD9N+RiMB00c9/74DXE+JgaV7IPx+e6O/pPtaL02:cbrE1kvcB74DXZ2MelZ2

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks