General

  • Target

    JaffaCakes118_99d7ce1533a07ebd29c7c03a7631e9ba3e8559c4c17b0217055577daf31aed3b

  • Size

    163KB

  • Sample

    241230-1xb1ha1jej

  • MD5

    31e820568e4473fb52f4a9633c634680

  • SHA1

    d567e9b29511d7e1269bfe6834c4f79f830c11cd

  • SHA256

    99d7ce1533a07ebd29c7c03a7631e9ba3e8559c4c17b0217055577daf31aed3b

  • SHA512

    94a5b6ac70c9d7d7eb51b4a319897d59fdd1c6c6d75583d20a20083df990dc320756dba36a3c1dde1e6226449746cc4a1713cb06f259753d62f8a8356df011f1

  • SSDEEP

    3072:i9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:i9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_99d7ce1533a07ebd29c7c03a7631e9ba3e8559c4c17b0217055577daf31aed3b

    • Size

      163KB

    • MD5

      31e820568e4473fb52f4a9633c634680

    • SHA1

      d567e9b29511d7e1269bfe6834c4f79f830c11cd

    • SHA256

      99d7ce1533a07ebd29c7c03a7631e9ba3e8559c4c17b0217055577daf31aed3b

    • SHA512

      94a5b6ac70c9d7d7eb51b4a319897d59fdd1c6c6d75583d20a20083df990dc320756dba36a3c1dde1e6226449746cc4a1713cb06f259753d62f8a8356df011f1

    • SSDEEP

      3072:i9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:i9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks