General

  • Target

    JaffaCakes118_6e76b8d231c30efbff6106ffa7b1b742375485a35adefdbc3f5935355ccdcf53

  • Size

    166KB

  • Sample

    241223-wtvwzsxjcr

  • MD5

    9e3b60e0f824ee39eee6af82006bdefd

  • SHA1

    d675c65fe43c3add5d1007cad995876992a31f40

  • SHA256

    6e76b8d231c30efbff6106ffa7b1b742375485a35adefdbc3f5935355ccdcf53

  • SHA512

    91f559ec4a60396a8d0dd18bfe9e663b93f8002df97596afe214fc789cb13816cfc6473047a8de09805c631bef30e505ed3aa130bdf892a7ddf95d04aa1a0093

  • SSDEEP

    3072:CuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+l9x:C0czbty9uiaJlA9x

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6e76b8d231c30efbff6106ffa7b1b742375485a35adefdbc3f5935355ccdcf53

    • Size

      166KB

    • MD5

      9e3b60e0f824ee39eee6af82006bdefd

    • SHA1

      d675c65fe43c3add5d1007cad995876992a31f40

    • SHA256

      6e76b8d231c30efbff6106ffa7b1b742375485a35adefdbc3f5935355ccdcf53

    • SHA512

      91f559ec4a60396a8d0dd18bfe9e663b93f8002df97596afe214fc789cb13816cfc6473047a8de09805c631bef30e505ed3aa130bdf892a7ddf95d04aa1a0093

    • SSDEEP

      3072:CuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+l9x:C0czbty9uiaJlA9x

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks