General

  • Target

    JaffaCakes118_c6d0097825eed7768c2a4328b941ecd1c7537c60a436e647b15d773708102e6d

  • Size

    163KB

  • Sample

    241230-2a7z4atrhz

  • MD5

    df157aed6fc4ea909829a9d3c911bde7

  • SHA1

    544447dffba433493eb8eb6bddca68d88768a337

  • SHA256

    c6d0097825eed7768c2a4328b941ecd1c7537c60a436e647b15d773708102e6d

  • SHA512

    69efb2dfb72242dd1c52fb7b8353b39d0b11fca78890ef81d930d075a6787ffdc87f8842624ce15393c8e621e53c0453681944d284a6b8f9b10f92d95afc10b3

  • SSDEEP

    3072:r9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:r9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c6d0097825eed7768c2a4328b941ecd1c7537c60a436e647b15d773708102e6d

    • Size

      163KB

    • MD5

      df157aed6fc4ea909829a9d3c911bde7

    • SHA1

      544447dffba433493eb8eb6bddca68d88768a337

    • SHA256

      c6d0097825eed7768c2a4328b941ecd1c7537c60a436e647b15d773708102e6d

    • SHA512

      69efb2dfb72242dd1c52fb7b8353b39d0b11fca78890ef81d930d075a6787ffdc87f8842624ce15393c8e621e53c0453681944d284a6b8f9b10f92d95afc10b3

    • SSDEEP

      3072:r9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:r9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks