General

  • Target

    JaffaCakes118_4dc23a7d52cb4f474bedae22ce47d95a928887c6b814ef843d7ce30f930aa25b

  • Size

    163KB

  • Sample

    241225-t8984syrbm

  • MD5

    92d568dc5ea2daf543e16fe255041cf3

  • SHA1

    ceaf3b3f5d2c84bc5bcc48c7f3873f4689e3b778

  • SHA256

    4dc23a7d52cb4f474bedae22ce47d95a928887c6b814ef843d7ce30f930aa25b

  • SHA512

    1f0fd10acb27731dc089bf018016d30072b442c613745da1066aad196838a4f416ecfa4eb7cbc376b3bc7df91118330640a24d5417396451fe81b9ac3130c85c

  • SSDEEP

    3072:5ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:js4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4dc23a7d52cb4f474bedae22ce47d95a928887c6b814ef843d7ce30f930aa25b

    • Size

      163KB

    • MD5

      92d568dc5ea2daf543e16fe255041cf3

    • SHA1

      ceaf3b3f5d2c84bc5bcc48c7f3873f4689e3b778

    • SHA256

      4dc23a7d52cb4f474bedae22ce47d95a928887c6b814ef843d7ce30f930aa25b

    • SHA512

      1f0fd10acb27731dc089bf018016d30072b442c613745da1066aad196838a4f416ecfa4eb7cbc376b3bc7df91118330640a24d5417396451fe81b9ac3130c85c

    • SSDEEP

      3072:5ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:js4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks