General

  • Target

    JaffaCakes118_ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636

  • Size

    428KB

  • Sample

    241225-w8xdcsslas

  • MD5

    d09fdc8c70d4c21d616b5911a05400ae

  • SHA1

    2d627f24c763d1a74b562fa8fab65eee4e98829e

  • SHA256

    ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636

  • SHA512

    a0ce0d71e0a92125dffa2596a84dbb732813bf6e6ed403ff0e5b0b0f43384da326c97d4db9d85e55b2d9a222da24bf10759ee27c2afb6af939ddccde9fb6a768

  • SSDEEP

    12288:nOlKg7NdfHE6ZY3RiuBl/2V5HYB6GWr7RXieK7ho3Q4BA3F5fYPaI2D4+U8P4RI:n+Ky7fHE6ZY3RiuBl/2V5HYB6GWr7RXG

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

67.207.95.35:443

86.107.98.232:8333

188.165.214.166:4664

144.91.110.219:9217

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636

    • Size

      428KB

    • MD5

      d09fdc8c70d4c21d616b5911a05400ae

    • SHA1

      2d627f24c763d1a74b562fa8fab65eee4e98829e

    • SHA256

      ae7fa64df4ed9920b42259aeb239adf3b7c0901df4cf0ee2574ab5ff45eac636

    • SHA512

      a0ce0d71e0a92125dffa2596a84dbb732813bf6e6ed403ff0e5b0b0f43384da326c97d4db9d85e55b2d9a222da24bf10759ee27c2afb6af939ddccde9fb6a768

    • SSDEEP

      12288:nOlKg7NdfHE6ZY3RiuBl/2V5HYB6GWr7RXieK7ho3Q4BA3F5fYPaI2D4+U8P4RI:n+Ky7fHE6ZY3RiuBl/2V5HYB6GWr7RXG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks