General

  • Target

    JaffaCakes118_ba7a1b1c67e1ef25ee9c1f30b939d914d0326eb93b24646e122dc15480fc39a6

  • Size

    163KB

  • Sample

    241227-clme4ayrcq

  • MD5

    c6012f6b7172daaee98460981a6c14be

  • SHA1

    fa5dfad187be67d43e4e1d92f83e3f48b059b24b

  • SHA256

    ba7a1b1c67e1ef25ee9c1f30b939d914d0326eb93b24646e122dc15480fc39a6

  • SHA512

    3d300721749fa1e12c1b47f6ad2aee89aed97a52d87f0a0124a835c8478aec0495b999a26a3a0bd0c8447dbab16e360de7127bc540c6ee59d91a824fca6ad5d4

  • SSDEEP

    3072:7ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ts4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ba7a1b1c67e1ef25ee9c1f30b939d914d0326eb93b24646e122dc15480fc39a6

    • Size

      163KB

    • MD5

      c6012f6b7172daaee98460981a6c14be

    • SHA1

      fa5dfad187be67d43e4e1d92f83e3f48b059b24b

    • SHA256

      ba7a1b1c67e1ef25ee9c1f30b939d914d0326eb93b24646e122dc15480fc39a6

    • SHA512

      3d300721749fa1e12c1b47f6ad2aee89aed97a52d87f0a0124a835c8478aec0495b999a26a3a0bd0c8447dbab16e360de7127bc540c6ee59d91a824fca6ad5d4

    • SSDEEP

      3072:7ar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ts4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks