General

  • Target

    JaffaCakes118_29df141d669bb6ae6da6c6a3b2b2d1e8f3c3d926b5073d86c856a2e29ff41073

  • Size

    432KB

  • Sample

    241230-3p2bjaxkhw

  • MD5

    e53655871d5ea1f932e09877c0e841d3

  • SHA1

    697be249dc71f1cefa968659f49f356afd6a9e37

  • SHA256

    29df141d669bb6ae6da6c6a3b2b2d1e8f3c3d926b5073d86c856a2e29ff41073

  • SHA512

    a647048363c6bb42bda8f3e3209ab8c15a8066a62e83b72de536f78963445e7d2578cdb1c41c1852857af60bb40d1858490342e3ef339ac3149290695399f8e5

  • SSDEEP

    6144:jXcjd3EK6oQKOKQKmCHdD3Dz9zRB9eB9xi0Ktx5tno6It6hSh/cuqg4k4:j+TZtneXxi0Kdq95jk

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

167.86.83.205:443

217.61.57.191:8172

5.196.213.55:808

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_29df141d669bb6ae6da6c6a3b2b2d1e8f3c3d926b5073d86c856a2e29ff41073

    • Size

      432KB

    • MD5

      e53655871d5ea1f932e09877c0e841d3

    • SHA1

      697be249dc71f1cefa968659f49f356afd6a9e37

    • SHA256

      29df141d669bb6ae6da6c6a3b2b2d1e8f3c3d926b5073d86c856a2e29ff41073

    • SHA512

      a647048363c6bb42bda8f3e3209ab8c15a8066a62e83b72de536f78963445e7d2578cdb1c41c1852857af60bb40d1858490342e3ef339ac3149290695399f8e5

    • SSDEEP

      6144:jXcjd3EK6oQKOKQKmCHdD3Dz9zRB9eB9xi0Ktx5tno6It6hSh/cuqg4k4:j+TZtneXxi0Kdq95jk

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks