General

  • Target

    JaffaCakes118_6ee1105e78e2c334324a856993e29cf616406d6503c79c6e22d6bf940bd159e5

  • Size

    162KB

  • Sample

    241230-a8dqcsslhl

  • MD5

    076f1979917c975c7063d659c9696cb8

  • SHA1

    4fee426d7854faf2f2fd959da690177e34de73d4

  • SHA256

    6ee1105e78e2c334324a856993e29cf616406d6503c79c6e22d6bf940bd159e5

  • SHA512

    90d57d19d0f9b547d6cd2730cf4c95894e89f193eed1b2afe22bfa373c06d4249c98d019b68dfd8a177dd852fdbe58b2bc149ea7ade589ac625fd45bf3537f2d

  • SSDEEP

    3072:aesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:s4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6ee1105e78e2c334324a856993e29cf616406d6503c79c6e22d6bf940bd159e5

    • Size

      162KB

    • MD5

      076f1979917c975c7063d659c9696cb8

    • SHA1

      4fee426d7854faf2f2fd959da690177e34de73d4

    • SHA256

      6ee1105e78e2c334324a856993e29cf616406d6503c79c6e22d6bf940bd159e5

    • SHA512

      90d57d19d0f9b547d6cd2730cf4c95894e89f193eed1b2afe22bfa373c06d4249c98d019b68dfd8a177dd852fdbe58b2bc149ea7ade589ac625fd45bf3537f2d

    • SSDEEP

      3072:aesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:s4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks