General

  • Target

    JaffaCakes118_d3d011b55da3e9f3236512d6bde958712cdfa290143330c4b3df43a2cc542e14

  • Size

    162KB

  • Sample

    241226-wq725stpfk

  • MD5

    219f4ea41f1cce7b944da20f9de2adef

  • SHA1

    60611d33dc097631538ededa1adb8ce76ed18cf4

  • SHA256

    d3d011b55da3e9f3236512d6bde958712cdfa290143330c4b3df43a2cc542e14

  • SHA512

    3d8d8af2ea7ae60686ef1efef31c0ec9c5d0014b10c973ef93594270267a850f4afd8bdb914e42c8f70c5873ec4c159e18215aa1732d003cee7309cb14fe9f01

  • SSDEEP

    3072:Iesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:C4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d3d011b55da3e9f3236512d6bde958712cdfa290143330c4b3df43a2cc542e14

    • Size

      162KB

    • MD5

      219f4ea41f1cce7b944da20f9de2adef

    • SHA1

      60611d33dc097631538ededa1adb8ce76ed18cf4

    • SHA256

      d3d011b55da3e9f3236512d6bde958712cdfa290143330c4b3df43a2cc542e14

    • SHA512

      3d8d8af2ea7ae60686ef1efef31c0ec9c5d0014b10c973ef93594270267a850f4afd8bdb914e42c8f70c5873ec4c159e18215aa1732d003cee7309cb14fe9f01

    • SSDEEP

      3072:Iesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:C4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks