General

  • Target

    JaffaCakes118_d78474917b0009f7ee46bf345682e23ae531ffa1b3fea8946b9ed2c6ad9f2785

  • Size

    163KB

  • Sample

    241229-3pgl5azrgq

  • MD5

    9f2e90c52909efa706352c49eea80000

  • SHA1

    e9b7c2f56d8552d336c665e5bc3254cdc8258e55

  • SHA256

    d78474917b0009f7ee46bf345682e23ae531ffa1b3fea8946b9ed2c6ad9f2785

  • SHA512

    2cd49ef1671a0087aa1d8bc382b69450618a03b91cd86eb31dec9475b7d538a33b5d805eb1b857032bb7ec17717b9aaf53faf986c67c2ffc3fa128218a2e4ff1

  • SSDEEP

    3072:Aar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:6s4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d78474917b0009f7ee46bf345682e23ae531ffa1b3fea8946b9ed2c6ad9f2785

    • Size

      163KB

    • MD5

      9f2e90c52909efa706352c49eea80000

    • SHA1

      e9b7c2f56d8552d336c665e5bc3254cdc8258e55

    • SHA256

      d78474917b0009f7ee46bf345682e23ae531ffa1b3fea8946b9ed2c6ad9f2785

    • SHA512

      2cd49ef1671a0087aa1d8bc382b69450618a03b91cd86eb31dec9475b7d538a33b5d805eb1b857032bb7ec17717b9aaf53faf986c67c2ffc3fa128218a2e4ff1

    • SSDEEP

      3072:Aar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:6s4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks