General

  • Target

    JaffaCakes118_d35364644bed0ada5548ccf4ab09d6623fa4d8bfa2f7f732ca7ac32f9f72f195

  • Size

    163KB

  • Sample

    241223-3x8qksvraw

  • MD5

    2921ae326a4580a0d3fb51cffe862dca

  • SHA1

    87aadb2118d7c50483876fa15ae21ff7597be0d4

  • SHA256

    d35364644bed0ada5548ccf4ab09d6623fa4d8bfa2f7f732ca7ac32f9f72f195

  • SHA512

    becbbb9263407211b34e58991228aae44cbcbe3bb8dffc407954a5e2b693a8f1056c8c0e3047d3ca882039dd1b5cec6fe1349dd12b0f33c48a297168423ff99f

  • SSDEEP

    3072:+ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Is4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d35364644bed0ada5548ccf4ab09d6623fa4d8bfa2f7f732ca7ac32f9f72f195

    • Size

      163KB

    • MD5

      2921ae326a4580a0d3fb51cffe862dca

    • SHA1

      87aadb2118d7c50483876fa15ae21ff7597be0d4

    • SHA256

      d35364644bed0ada5548ccf4ab09d6623fa4d8bfa2f7f732ca7ac32f9f72f195

    • SHA512

      becbbb9263407211b34e58991228aae44cbcbe3bb8dffc407954a5e2b693a8f1056c8c0e3047d3ca882039dd1b5cec6fe1349dd12b0f33c48a297168423ff99f

    • SSDEEP

      3072:+ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Is4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks