General

  • Target

    JaffaCakes118_55200b96646021aa0dc70ba99a1494b689c821407eaa8f0f4a2ae46f2fe0c1b1

  • Size

    167KB

  • Sample

    241223-wk361awqfn

  • MD5

    fdc34448da591cb773498ee1b411fc7c

  • SHA1

    8b492f12d065979022d7661d0279f9cc083cb9ea

  • SHA256

    55200b96646021aa0dc70ba99a1494b689c821407eaa8f0f4a2ae46f2fe0c1b1

  • SHA512

    27b4a41b3e1fab19ff74b2af8b43d9b6e1244a305dc99ce22f3941af95d6e01f9760b3adf22ca84e5e0d95c3c0841ec7eecf33dc41cd472e024bc5a6f63006a2

  • SSDEEP

    3072:PkG/TPp+AgPbdXnx6ZBfPG6+Xo4Y63F35oJq3Kco08AQazELZn+1qPrx6/idFa:zERMVPG6+Y63HoG1QawL40Prx6K/a

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_55200b96646021aa0dc70ba99a1494b689c821407eaa8f0f4a2ae46f2fe0c1b1

    • Size

      167KB

    • MD5

      fdc34448da591cb773498ee1b411fc7c

    • SHA1

      8b492f12d065979022d7661d0279f9cc083cb9ea

    • SHA256

      55200b96646021aa0dc70ba99a1494b689c821407eaa8f0f4a2ae46f2fe0c1b1

    • SHA512

      27b4a41b3e1fab19ff74b2af8b43d9b6e1244a305dc99ce22f3941af95d6e01f9760b3adf22ca84e5e0d95c3c0841ec7eecf33dc41cd472e024bc5a6f63006a2

    • SSDEEP

      3072:PkG/TPp+AgPbdXnx6ZBfPG6+Xo4Y63F35oJq3Kco08AQazELZn+1qPrx6/idFa:zERMVPG6+Y63HoG1QawL40Prx6K/a

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks