General

  • Target

    JaffaCakes118_f900b3b429490e58ce7b988bf65c6dd436d41a1a017e15c3b6b37066feba465c

  • Size

    163KB

  • Sample

    241225-wew6ha1naj

  • MD5

    0faa862ea99c23466aec8e54b3622710

  • SHA1

    71d8b491123d39dd2bb006ae4fbab212fb151d6f

  • SHA256

    f900b3b429490e58ce7b988bf65c6dd436d41a1a017e15c3b6b37066feba465c

  • SHA512

    a949456f02e08fc82fc5dcac430a53e553f7520f5d7a46cf76a148a0e124a45f5eacfd029cfa088ae8b220c687ee9612a68e454af7e941b80355c53b4c0a60f3

  • SSDEEP

    3072:7ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ts4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f900b3b429490e58ce7b988bf65c6dd436d41a1a017e15c3b6b37066feba465c

    • Size

      163KB

    • MD5

      0faa862ea99c23466aec8e54b3622710

    • SHA1

      71d8b491123d39dd2bb006ae4fbab212fb151d6f

    • SHA256

      f900b3b429490e58ce7b988bf65c6dd436d41a1a017e15c3b6b37066feba465c

    • SHA512

      a949456f02e08fc82fc5dcac430a53e553f7520f5d7a46cf76a148a0e124a45f5eacfd029cfa088ae8b220c687ee9612a68e454af7e941b80355c53b4c0a60f3

    • SSDEEP

      3072:7ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ts4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks