General

  • Target

    JaffaCakes118_beeee41d297e97d53a669a405c5b06d834330927a60788f47d9f8877c6df4dd9

  • Size

    163KB

  • Sample

    241226-vymwhaslaw

  • MD5

    e55f768187e3f0b88da5cfd31c460fbb

  • SHA1

    d04d0a241dc0c6205052afb359e47b510fd88c37

  • SHA256

    beeee41d297e97d53a669a405c5b06d834330927a60788f47d9f8877c6df4dd9

  • SHA512

    893de0b309b26d6f7ed148f467f314127f774e113c4601d96c6acf35f11fc57d802c63cb2d0c9dec6b4c730ace0bac164195b547b3217fbe011448d0a44705b8

  • SSDEEP

    3072:jar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ls4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_beeee41d297e97d53a669a405c5b06d834330927a60788f47d9f8877c6df4dd9

    • Size

      163KB

    • MD5

      e55f768187e3f0b88da5cfd31c460fbb

    • SHA1

      d04d0a241dc0c6205052afb359e47b510fd88c37

    • SHA256

      beeee41d297e97d53a669a405c5b06d834330927a60788f47d9f8877c6df4dd9

    • SHA512

      893de0b309b26d6f7ed148f467f314127f774e113c4601d96c6acf35f11fc57d802c63cb2d0c9dec6b4c730ace0bac164195b547b3217fbe011448d0a44705b8

    • SSDEEP

      3072:jar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ls4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks