General

  • Target

    JaffaCakes118_ebbe3d40cb2d2504205437fe0a4fa1b993c44a4a663a2296d04f9437462596c2

  • Size

    171KB

  • Sample

    241223-v1anyswlel

  • MD5

    c52eb1385e0619fad08ae801f8d08253

  • SHA1

    8c4100d2d96c19ec0bb984a6e8c98b0b59da0823

  • SHA256

    ebbe3d40cb2d2504205437fe0a4fa1b993c44a4a663a2296d04f9437462596c2

  • SHA512

    f474c3483be32b4a027272f701af99db54555245327fbc61f47942c9b021206a3ab37937889e12d8bbbd6fc28f25339f5afabd43da116aac5799e6881899ccb3

  • SSDEEP

    3072:di49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:dH9RVaPEmsdHdbQUbd2H3

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

128.199.200.38:443

192.163.233.216:6601

43.229.206.244:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ebbe3d40cb2d2504205437fe0a4fa1b993c44a4a663a2296d04f9437462596c2

    • Size

      171KB

    • MD5

      c52eb1385e0619fad08ae801f8d08253

    • SHA1

      8c4100d2d96c19ec0bb984a6e8c98b0b59da0823

    • SHA256

      ebbe3d40cb2d2504205437fe0a4fa1b993c44a4a663a2296d04f9437462596c2

    • SHA512

      f474c3483be32b4a027272f701af99db54555245327fbc61f47942c9b021206a3ab37937889e12d8bbbd6fc28f25339f5afabd43da116aac5799e6881899ccb3

    • SSDEEP

      3072:di49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:dH9RVaPEmsdHdbQUbd2H3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks