General

  • Target

    JaffaCakes118_f3d169ebeb8a017741bd0e485ba8fa161166a19a423106d8095c19a6279d2ac2

  • Size

    163KB

  • Sample

    241224-ag5prswnal

  • MD5

    5246b0ab3abeff47e01b047e236b33b9

  • SHA1

    449b3a040ae85e3dae7ce4c0cc5d5419d7bc758e

  • SHA256

    f3d169ebeb8a017741bd0e485ba8fa161166a19a423106d8095c19a6279d2ac2

  • SHA512

    eede1b519521d42fa4a34bd2fc0fc94ea469d61f729b81c60644ec5631c6533bd2d1e2e171611f34e9989cbafad49dcf660b590a56b3dfaf35136ef93df60316

  • SSDEEP

    3072:D9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:D9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f3d169ebeb8a017741bd0e485ba8fa161166a19a423106d8095c19a6279d2ac2

    • Size

      163KB

    • MD5

      5246b0ab3abeff47e01b047e236b33b9

    • SHA1

      449b3a040ae85e3dae7ce4c0cc5d5419d7bc758e

    • SHA256

      f3d169ebeb8a017741bd0e485ba8fa161166a19a423106d8095c19a6279d2ac2

    • SHA512

      eede1b519521d42fa4a34bd2fc0fc94ea469d61f729b81c60644ec5631c6533bd2d1e2e171611f34e9989cbafad49dcf660b590a56b3dfaf35136ef93df60316

    • SSDEEP

      3072:D9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:D9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks