General

  • Target

    JaffaCakes118_14ee8c5bb2f40ac619ad89c4aa8f62ebe55e8a5f603c21c7f1efabed8333805f

  • Size

    166KB

  • Sample

    241223-xljpesxphs

  • MD5

    b9c4abf5cfadebe891857073ff4076aa

  • SHA1

    7d258180a385cf0d191dc5ef9ed66f30031981d0

  • SHA256

    14ee8c5bb2f40ac619ad89c4aa8f62ebe55e8a5f603c21c7f1efabed8333805f

  • SHA512

    ad43fdeaf750ef1341917589c75100e15ece9427be5f22e7a454ad582cef29e9e146aae2518543d7273881182a3517be9099f61da0991daed0cc91d8d0710c22

  • SSDEEP

    3072:xuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+pk:x0czbty9uiaJlEk

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_14ee8c5bb2f40ac619ad89c4aa8f62ebe55e8a5f603c21c7f1efabed8333805f

    • Size

      166KB

    • MD5

      b9c4abf5cfadebe891857073ff4076aa

    • SHA1

      7d258180a385cf0d191dc5ef9ed66f30031981d0

    • SHA256

      14ee8c5bb2f40ac619ad89c4aa8f62ebe55e8a5f603c21c7f1efabed8333805f

    • SHA512

      ad43fdeaf750ef1341917589c75100e15ece9427be5f22e7a454ad582cef29e9e146aae2518543d7273881182a3517be9099f61da0991daed0cc91d8d0710c22

    • SSDEEP

      3072:xuFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+pk:x0czbty9uiaJlEk

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks