General

  • Target

    JaffaCakes118_9504c795b341c66e191c67c51d729d0a02da796504c03db5262c72ff1f2f4950

  • Size

    163KB

  • Sample

    241226-zm3vsszlam

  • MD5

    66e96d38f0fe33516c52a46a1232f4cd

  • SHA1

    411a4e6b56b5488314cebc351ca129f55bc3bd3d

  • SHA256

    9504c795b341c66e191c67c51d729d0a02da796504c03db5262c72ff1f2f4950

  • SHA512

    d30f7b17c77f76ee68ed5d31c0951f5ce77bb9d3c9da3ed58402882372239edb83d596d3eca574e0c989833e197079a9744e2fbf1b833e0998dad7e58bbb8b4a

  • SSDEEP

    3072:Par6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ps4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9504c795b341c66e191c67c51d729d0a02da796504c03db5262c72ff1f2f4950

    • Size

      163KB

    • MD5

      66e96d38f0fe33516c52a46a1232f4cd

    • SHA1

      411a4e6b56b5488314cebc351ca129f55bc3bd3d

    • SHA256

      9504c795b341c66e191c67c51d729d0a02da796504c03db5262c72ff1f2f4950

    • SHA512

      d30f7b17c77f76ee68ed5d31c0951f5ce77bb9d3c9da3ed58402882372239edb83d596d3eca574e0c989833e197079a9744e2fbf1b833e0998dad7e58bbb8b4a

    • SSDEEP

      3072:Par6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ps4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks