General

  • Target

    JaffaCakes118_80b870b66b1948dde625b3ad9b254c975cfec50394301fa1866ac2a657e54ca0

  • Size

    163KB

  • Sample

    241224-rs584szlcq

  • MD5

    a34c30bdb5c45f98d72694b241d6e1e7

  • SHA1

    cd32333f5d1a52f528ef94ae5a5151489405f9de

  • SHA256

    80b870b66b1948dde625b3ad9b254c975cfec50394301fa1866ac2a657e54ca0

  • SHA512

    74b82eb962795dc918202c6b1a76d921091d299f940334803e4aa5b67cd408ba20df99053cd13a59dcd965085ea9e5f4586c37ee4852c5b8fa62b91c7f7e3b1e

  • SSDEEP

    3072:yar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ks4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_80b870b66b1948dde625b3ad9b254c975cfec50394301fa1866ac2a657e54ca0

    • Size

      163KB

    • MD5

      a34c30bdb5c45f98d72694b241d6e1e7

    • SHA1

      cd32333f5d1a52f528ef94ae5a5151489405f9de

    • SHA256

      80b870b66b1948dde625b3ad9b254c975cfec50394301fa1866ac2a657e54ca0

    • SHA512

      74b82eb962795dc918202c6b1a76d921091d299f940334803e4aa5b67cd408ba20df99053cd13a59dcd965085ea9e5f4586c37ee4852c5b8fa62b91c7f7e3b1e

    • SSDEEP

      3072:yar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ks4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks