General

  • Target

    JaffaCakes118_c27f8755fde4a0b2960d62b16f0fcc00d3139b2ba01f52d214618ef4c4896d37

  • Size

    163KB

  • Sample

    241223-ybpy5aynby

  • MD5

    4ea349aee3790e51593613deb8224551

  • SHA1

    e8d1b0bdd15d0ecf13824198584e94b1de7305dc

  • SHA256

    c27f8755fde4a0b2960d62b16f0fcc00d3139b2ba01f52d214618ef4c4896d37

  • SHA512

    b733a33f80c13bffaf00d3ef58daab536141d23e70532a889e69b3d5efe7d0519bf478ca46891cb7eec16436bff52b571bc7bb7fe48553521e34b3159bddfa48

  • SSDEEP

    3072:Jar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:zs4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c27f8755fde4a0b2960d62b16f0fcc00d3139b2ba01f52d214618ef4c4896d37

    • Size

      163KB

    • MD5

      4ea349aee3790e51593613deb8224551

    • SHA1

      e8d1b0bdd15d0ecf13824198584e94b1de7305dc

    • SHA256

      c27f8755fde4a0b2960d62b16f0fcc00d3139b2ba01f52d214618ef4c4896d37

    • SHA512

      b733a33f80c13bffaf00d3ef58daab536141d23e70532a889e69b3d5efe7d0519bf478ca46891cb7eec16436bff52b571bc7bb7fe48553521e34b3159bddfa48

    • SSDEEP

      3072:Jar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:zs4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks