General

  • Target

    JaffaCakes118_6bab22923b4349937c097592941074dd5026d853177607ba9bb8ab1d72c6e2d8

  • Size

    170KB

  • Sample

    241224-clys5ayndz

  • MD5

    12b2137d603aaeaa8b7149b5936b9ff7

  • SHA1

    166d5b0d3e7ad468c517fd16265dc88343b76ef2

  • SHA256

    6bab22923b4349937c097592941074dd5026d853177607ba9bb8ab1d72c6e2d8

  • SHA512

    4d5a0e9175baa0e77580e3328b85efa4f6df34ae8c7980ccd1745e1fd73b4b0ed8be44dab358a31654f575d4266f7608a600ae26d8c0b0ce896340518aa9edf2

  • SSDEEP

    3072:BV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:BV/jTe38LiI4Oi75izyn+4lm

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6bab22923b4349937c097592941074dd5026d853177607ba9bb8ab1d72c6e2d8

    • Size

      170KB

    • MD5

      12b2137d603aaeaa8b7149b5936b9ff7

    • SHA1

      166d5b0d3e7ad468c517fd16265dc88343b76ef2

    • SHA256

      6bab22923b4349937c097592941074dd5026d853177607ba9bb8ab1d72c6e2d8

    • SHA512

      4d5a0e9175baa0e77580e3328b85efa4f6df34ae8c7980ccd1745e1fd73b4b0ed8be44dab358a31654f575d4266f7608a600ae26d8c0b0ce896340518aa9edf2

    • SSDEEP

      3072:BV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erj:BV/jTe38LiI4Oi75izyn+4lm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks