General

  • Target

    JaffaCakes118_7eebc4648dc45620338d87aa36fd0c02108ed6b809b509445249eec56ab4dd89

  • Size

    171KB

  • Sample

    241224-bel1baxkgz

  • MD5

    39f0e2f81a18ee2e56d10a179eac7d3e

  • SHA1

    325528e3d8f82d1155769971708c4bc64215f755

  • SHA256

    7eebc4648dc45620338d87aa36fd0c02108ed6b809b509445249eec56ab4dd89

  • SHA512

    114f14cbffa343711519e82cb541423180766946dcb9cf6a008d1eaa5d355d7864b5216edfb8417ac1726f0202b0a8a4a1f793fc91a7b1eb3f5496805ccc45a6

  • SSDEEP

    3072:Si49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:SH9RVaPEmsdHdbQUbd2H3

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

128.199.200.38:443

192.163.233.216:6601

43.229.206.244:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7eebc4648dc45620338d87aa36fd0c02108ed6b809b509445249eec56ab4dd89

    • Size

      171KB

    • MD5

      39f0e2f81a18ee2e56d10a179eac7d3e

    • SHA1

      325528e3d8f82d1155769971708c4bc64215f755

    • SHA256

      7eebc4648dc45620338d87aa36fd0c02108ed6b809b509445249eec56ab4dd89

    • SHA512

      114f14cbffa343711519e82cb541423180766946dcb9cf6a008d1eaa5d355d7864b5216edfb8417ac1726f0202b0a8a4a1f793fc91a7b1eb3f5496805ccc45a6

    • SSDEEP

      3072:Si49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:SH9RVaPEmsdHdbQUbd2H3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks