General

  • Target

    JaffaCakes118_e0c70a316d5da5d8d0288f96d8da1c42fc5e2046861450817f6e5d7dc592251a

  • Size

    163KB

  • Sample

    241230-1wth6atlds

  • MD5

    ba73e21c037357ba777563a940dcc303

  • SHA1

    9b06d1fbfcabbc5de78230d13a5b25dc419efd26

  • SHA256

    e0c70a316d5da5d8d0288f96d8da1c42fc5e2046861450817f6e5d7dc592251a

  • SHA512

    2963dc1beac27da8f2665133ce71782863bf81f79b4d2a5cb6e71bf2d73ecdc67d2e481e8c51644aa8008da57bd19600c9ffcfb8acc1def0e9f34751d2dcda01

  • SSDEEP

    3072:U9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:U9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e0c70a316d5da5d8d0288f96d8da1c42fc5e2046861450817f6e5d7dc592251a

    • Size

      163KB

    • MD5

      ba73e21c037357ba777563a940dcc303

    • SHA1

      9b06d1fbfcabbc5de78230d13a5b25dc419efd26

    • SHA256

      e0c70a316d5da5d8d0288f96d8da1c42fc5e2046861450817f6e5d7dc592251a

    • SHA512

      2963dc1beac27da8f2665133ce71782863bf81f79b4d2a5cb6e71bf2d73ecdc67d2e481e8c51644aa8008da57bd19600c9ffcfb8acc1def0e9f34751d2dcda01

    • SSDEEP

      3072:U9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:U9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks