General

  • Target

    JaffaCakes118_9dc76b96f2d9b8926000c6c9e62c58962ab8366bcfdb20629c9c45c984521f00

  • Size

    166KB

  • Sample

    241223-rvs2kaslbn

  • MD5

    29bf71fccb00f7e42383cb4eb5280668

  • SHA1

    aabfdbadebfba0598dfc67324bd2fa176e3937df

  • SHA256

    9dc76b96f2d9b8926000c6c9e62c58962ab8366bcfdb20629c9c45c984521f00

  • SHA512

    cc5e5462744a95fe773640e646cc1f70923fd9705067d65e0d2bf24d2b0d33698b96206306ea21d18dab4e2d0ed3ebc8adfdf1fe63c3f670ea3f766555963879

  • SSDEEP

    3072:euFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:e0czbty9uiaJlHE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9dc76b96f2d9b8926000c6c9e62c58962ab8366bcfdb20629c9c45c984521f00

    • Size

      166KB

    • MD5

      29bf71fccb00f7e42383cb4eb5280668

    • SHA1

      aabfdbadebfba0598dfc67324bd2fa176e3937df

    • SHA256

      9dc76b96f2d9b8926000c6c9e62c58962ab8366bcfdb20629c9c45c984521f00

    • SHA512

      cc5e5462744a95fe773640e646cc1f70923fd9705067d65e0d2bf24d2b0d33698b96206306ea21d18dab4e2d0ed3ebc8adfdf1fe63c3f670ea3f766555963879

    • SSDEEP

      3072:euFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+eE:e0czbty9uiaJlHE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks