General

  • Target

    JaffaCakes118_aa7f97c00f0a9884e480b0193537c2db1abd36c1256223d1b07b29229571235a

  • Size

    162KB

  • Sample

    241225-pxm7zssrfy

  • MD5

    f1d29eecc4d45edc60c878cf23c88619

  • SHA1

    f31a77557b07c71ecb91a59ee4e5555b35173425

  • SHA256

    aa7f97c00f0a9884e480b0193537c2db1abd36c1256223d1b07b29229571235a

  • SHA512

    cd3c01f47180e60d0d469597ca180b2543d8aee5081a171c565b650f3c109b8f008e1ccb9d7103792faa0cf1c64becc18527710911de825b3b0f2a964d7c3ea8

  • SSDEEP

    3072:2esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLG5:Y4+VZQpt5hyPsa1ekiEF5

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_aa7f97c00f0a9884e480b0193537c2db1abd36c1256223d1b07b29229571235a

    • Size

      162KB

    • MD5

      f1d29eecc4d45edc60c878cf23c88619

    • SHA1

      f31a77557b07c71ecb91a59ee4e5555b35173425

    • SHA256

      aa7f97c00f0a9884e480b0193537c2db1abd36c1256223d1b07b29229571235a

    • SHA512

      cd3c01f47180e60d0d469597ca180b2543d8aee5081a171c565b650f3c109b8f008e1ccb9d7103792faa0cf1c64becc18527710911de825b3b0f2a964d7c3ea8

    • SSDEEP

      3072:2esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLG5:Y4+VZQpt5hyPsa1ekiEF5

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks