General

  • Target

    JaffaCakes118_3b6d0ada95de9f093efd00772c36d3f5e42eac48a660216519c72ce3cecd61e9

  • Size

    163KB

  • Sample

    241225-s6w32axmdl

  • MD5

    f21602b7e297541b667e618b57d25a16

  • SHA1

    6e111282e0bc8b9b5cba284a2af58cdac62c216e

  • SHA256

    3b6d0ada95de9f093efd00772c36d3f5e42eac48a660216519c72ce3cecd61e9

  • SHA512

    21f79d04dedc1ff2808882f144caed26b5bc4ed63d52a2275e71e165e501973a458491a7d64b71a07fa3da89c8cab296852a1ec72d314e8b950d8e5b21fdbfa7

  • SSDEEP

    3072:dar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Ps4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3b6d0ada95de9f093efd00772c36d3f5e42eac48a660216519c72ce3cecd61e9

    • Size

      163KB

    • MD5

      f21602b7e297541b667e618b57d25a16

    • SHA1

      6e111282e0bc8b9b5cba284a2af58cdac62c216e

    • SHA256

      3b6d0ada95de9f093efd00772c36d3f5e42eac48a660216519c72ce3cecd61e9

    • SHA512

      21f79d04dedc1ff2808882f144caed26b5bc4ed63d52a2275e71e165e501973a458491a7d64b71a07fa3da89c8cab296852a1ec72d314e8b950d8e5b21fdbfa7

    • SSDEEP

      3072:dar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Ps4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks