General

  • Target

    JaffaCakes118_9ce52703ed4bdff3ad6186d20b7685beb5bb1df63028a894251cdfdb71e35cf5

  • Size

    162KB

  • Sample

    241224-dfe99sznex

  • MD5

    b8145b9887bb705c6fc5b59ddf49840e

  • SHA1

    21182b10995a59d5d1c884562db124a74a7c18b3

  • SHA256

    9ce52703ed4bdff3ad6186d20b7685beb5bb1df63028a894251cdfdb71e35cf5

  • SHA512

    a6cf3a1b994ad88ddde96bf971150dcfba0a65a3bd52eca7b4f4c198bf7c48930d34be2eb73f40848e1773651a0ecd31cd20f42ff02ca37cc9c662990b1bfd53

  • SSDEEP

    3072:Jesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:V4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9ce52703ed4bdff3ad6186d20b7685beb5bb1df63028a894251cdfdb71e35cf5

    • Size

      162KB

    • MD5

      b8145b9887bb705c6fc5b59ddf49840e

    • SHA1

      21182b10995a59d5d1c884562db124a74a7c18b3

    • SHA256

      9ce52703ed4bdff3ad6186d20b7685beb5bb1df63028a894251cdfdb71e35cf5

    • SHA512

      a6cf3a1b994ad88ddde96bf971150dcfba0a65a3bd52eca7b4f4c198bf7c48930d34be2eb73f40848e1773651a0ecd31cd20f42ff02ca37cc9c662990b1bfd53

    • SSDEEP

      3072:Jesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:V4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks