General

  • Target

    JaffaCakes118_087b6fa4998789091a6cad6634febc0f13c9be451ce22cfc3f84c36e4acffec2

  • Size

    163KB

  • Sample

    241224-bfj74sxlby

  • MD5

    373ae9eab649db1558eefe891728268c

  • SHA1

    2f3b815e055e4a69e593ba4cbf1a117703ff7e5f

  • SHA256

    087b6fa4998789091a6cad6634febc0f13c9be451ce22cfc3f84c36e4acffec2

  • SHA512

    b3f368c3f7867e8c2f025a00667477b5fa257c426a1c4fc80fc1bbe6397a81fc046fc884b6bacf53c1c7948a86b6a047199aada0fa286424454274878ab12a5c

  • SSDEEP

    3072:Var6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:3s4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_087b6fa4998789091a6cad6634febc0f13c9be451ce22cfc3f84c36e4acffec2

    • Size

      163KB

    • MD5

      373ae9eab649db1558eefe891728268c

    • SHA1

      2f3b815e055e4a69e593ba4cbf1a117703ff7e5f

    • SHA256

      087b6fa4998789091a6cad6634febc0f13c9be451ce22cfc3f84c36e4acffec2

    • SHA512

      b3f368c3f7867e8c2f025a00667477b5fa257c426a1c4fc80fc1bbe6397a81fc046fc884b6bacf53c1c7948a86b6a047199aada0fa286424454274878ab12a5c

    • SSDEEP

      3072:Var6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:3s4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks