General

  • Target

    JaffaCakes118_6374d93f10cb8aa04c68685fc0768d76284d7033c8f157399f17a15b180b9ebb

  • Size

    162KB

  • Sample

    241227-cl4dlsyrel

  • MD5

    f3daa028caae274ea7cc06581418f288

  • SHA1

    6996654a7f04d3a76ef0e0d9091ec91ced8a829e

  • SHA256

    6374d93f10cb8aa04c68685fc0768d76284d7033c8f157399f17a15b180b9ebb

  • SHA512

    732ce0019b98ffcfaa03a6e9bbeda1a331bf33e3a540bd25d8cb7b067594cde9988b984edcd4ce5c0824873908bb4453cd74eb6bd93738db17cb8f466bd496aa

  • SSDEEP

    3072:hesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:d4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6374d93f10cb8aa04c68685fc0768d76284d7033c8f157399f17a15b180b9ebb

    • Size

      162KB

    • MD5

      f3daa028caae274ea7cc06581418f288

    • SHA1

      6996654a7f04d3a76ef0e0d9091ec91ced8a829e

    • SHA256

      6374d93f10cb8aa04c68685fc0768d76284d7033c8f157399f17a15b180b9ebb

    • SHA512

      732ce0019b98ffcfaa03a6e9bbeda1a331bf33e3a540bd25d8cb7b067594cde9988b984edcd4ce5c0824873908bb4453cd74eb6bd93738db17cb8f466bd496aa

    • SSDEEP

      3072:hesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:d4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks