General

  • Target

    JaffaCakes118_6b05fdb1dc6e01fe2323aba189dbe8b582a5555e58ae37ed9d35a0c1d653e12c

  • Size

    163KB

  • Sample

    241226-3ecv7avlaw

  • MD5

    e60c5e2bdef99d15ff6c9a910bef3a0c

  • SHA1

    74a4e291c153d9dcd950d01cd08a45e197a5df30

  • SHA256

    6b05fdb1dc6e01fe2323aba189dbe8b582a5555e58ae37ed9d35a0c1d653e12c

  • SHA512

    304ce55228f1e99f5a1e9d6d6f8edb9a9101c1af3116d5c574ff41f7eca622c820fb08a22118ed3b7bd9c2b20aa317d96fe26a9cd90cdab9e0aa9803aaea4b80

  • SSDEEP

    3072:Par6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ps4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6b05fdb1dc6e01fe2323aba189dbe8b582a5555e58ae37ed9d35a0c1d653e12c

    • Size

      163KB

    • MD5

      e60c5e2bdef99d15ff6c9a910bef3a0c

    • SHA1

      74a4e291c153d9dcd950d01cd08a45e197a5df30

    • SHA256

      6b05fdb1dc6e01fe2323aba189dbe8b582a5555e58ae37ed9d35a0c1d653e12c

    • SHA512

      304ce55228f1e99f5a1e9d6d6f8edb9a9101c1af3116d5c574ff41f7eca622c820fb08a22118ed3b7bd9c2b20aa317d96fe26a9cd90cdab9e0aa9803aaea4b80

    • SSDEEP

      3072:Par6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ps4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks