General

  • Target

    JaffaCakes118_416d6507ec872ddbc14dab398e610cc0902b3cbc876f6db21a8b8a6049d5fc6c

  • Size

    163KB

  • Sample

    241224-vtf76asnfv

  • MD5

    50df168d5acc9e8deb67a823bf6a63a3

  • SHA1

    cca086210f6e8808d9b540236265b5df5b5aa089

  • SHA256

    416d6507ec872ddbc14dab398e610cc0902b3cbc876f6db21a8b8a6049d5fc6c

  • SHA512

    f22d65a69d9c914a6b38f2ff18f530ec80e8e351d34e98eddf09195c438ce8a9e9f5a0f7a4eb12934a0ec607a155773a7a615e82bce012a697bdc16b0d7bb45c

  • SSDEEP

    3072:far6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:5s4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_416d6507ec872ddbc14dab398e610cc0902b3cbc876f6db21a8b8a6049d5fc6c

    • Size

      163KB

    • MD5

      50df168d5acc9e8deb67a823bf6a63a3

    • SHA1

      cca086210f6e8808d9b540236265b5df5b5aa089

    • SHA256

      416d6507ec872ddbc14dab398e610cc0902b3cbc876f6db21a8b8a6049d5fc6c

    • SHA512

      f22d65a69d9c914a6b38f2ff18f530ec80e8e351d34e98eddf09195c438ce8a9e9f5a0f7a4eb12934a0ec607a155773a7a615e82bce012a697bdc16b0d7bb45c

    • SSDEEP

      3072:far6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:5s4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks