General

  • Target

    JaffaCakes118_fad496d2bef11c771e428fb6c9bb931f1af3ce8120e9d7f283dd66b4f9ff0bd8

  • Size

    163KB

  • Sample

    241223-3ae5ravke1

  • MD5

    4eaf85935b09dc5a26c75f569cd6e157

  • SHA1

    0a38467900b7e56d754f548382bcb3658923f231

  • SHA256

    fad496d2bef11c771e428fb6c9bb931f1af3ce8120e9d7f283dd66b4f9ff0bd8

  • SHA512

    a39ea89ac6598f23defb2409d06d197252665c48b2e97ceba7d74332046f65aa591e1e498e6c621324da1ec995db90cf77e13e2e9d1fde37b9026afea87d2a29

  • SSDEEP

    3072:h9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:h9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fad496d2bef11c771e428fb6c9bb931f1af3ce8120e9d7f283dd66b4f9ff0bd8

    • Size

      163KB

    • MD5

      4eaf85935b09dc5a26c75f569cd6e157

    • SHA1

      0a38467900b7e56d754f548382bcb3658923f231

    • SHA256

      fad496d2bef11c771e428fb6c9bb931f1af3ce8120e9d7f283dd66b4f9ff0bd8

    • SHA512

      a39ea89ac6598f23defb2409d06d197252665c48b2e97ceba7d74332046f65aa591e1e498e6c621324da1ec995db90cf77e13e2e9d1fde37b9026afea87d2a29

    • SSDEEP

      3072:h9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:h9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks