General

  • Target

    JaffaCakes118_b2543d06f0b63683036e83f7ca1386e1343f0e64146206ca47f71fbf9d11e3b4

  • Size

    162KB

  • Sample

    241224-bf62waxnbk

  • MD5

    9c7d8502616168d0fe00219a6cd93058

  • SHA1

    e6b3723dec0f734e3fe1c9bc8af4bbe7901592c6

  • SHA256

    b2543d06f0b63683036e83f7ca1386e1343f0e64146206ca47f71fbf9d11e3b4

  • SHA512

    a48ce8bbae36ef9362e82005564c504b7a641c2b1e226e12ba5cd18029df0fd1b1efc1c7942c414c9e2ec0e42462ac02c3355981ef168d27b8592efeb8b2d66a

  • SSDEEP

    3072:besl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:f4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b2543d06f0b63683036e83f7ca1386e1343f0e64146206ca47f71fbf9d11e3b4

    • Size

      162KB

    • MD5

      9c7d8502616168d0fe00219a6cd93058

    • SHA1

      e6b3723dec0f734e3fe1c9bc8af4bbe7901592c6

    • SHA256

      b2543d06f0b63683036e83f7ca1386e1343f0e64146206ca47f71fbf9d11e3b4

    • SHA512

      a48ce8bbae36ef9362e82005564c504b7a641c2b1e226e12ba5cd18029df0fd1b1efc1c7942c414c9e2ec0e42462ac02c3355981ef168d27b8592efeb8b2d66a

    • SSDEEP

      3072:besl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:f4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks