General

  • Target

    JaffaCakes118_a71b237b792a2f7cc7f3c2e7d03e9442e477c518d28010611f7d574da341c853

  • Size

    163KB

  • Sample

    241224-mlsxzsvphr

  • MD5

    41a1bc121894031834319df3d325effb

  • SHA1

    7cbeaeeb60e531b74f1413987ffce955d4732b38

  • SHA256

    a71b237b792a2f7cc7f3c2e7d03e9442e477c518d28010611f7d574da341c853

  • SHA512

    cb20214662c0ab1e8c0b4b8849b071b24387b63c49a38ae87d2d572ccb07f0f5317bdabc4d2970c7d3c4210db5a37e878d59d2588723c385f7bd89f96ebfd30d

  • SSDEEP

    3072:Mar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:us4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a71b237b792a2f7cc7f3c2e7d03e9442e477c518d28010611f7d574da341c853

    • Size

      163KB

    • MD5

      41a1bc121894031834319df3d325effb

    • SHA1

      7cbeaeeb60e531b74f1413987ffce955d4732b38

    • SHA256

      a71b237b792a2f7cc7f3c2e7d03e9442e477c518d28010611f7d574da341c853

    • SHA512

      cb20214662c0ab1e8c0b4b8849b071b24387b63c49a38ae87d2d572ccb07f0f5317bdabc4d2970c7d3c4210db5a37e878d59d2588723c385f7bd89f96ebfd30d

    • SSDEEP

      3072:Mar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:us4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks