General

  • Target

    JaffaCakes118_e0b4b0420ea9a10f8378a4c8afeb1a6b6508f16febf59c62ce0d8b9142e406d1

  • Size

    163KB

  • Sample

    241230-bzk9hstmbk

  • MD5

    22535da16e9b540e5de60ce41a3583f9

  • SHA1

    96ed80ef68fe14afc31f40ad27230637f806fa00

  • SHA256

    e0b4b0420ea9a10f8378a4c8afeb1a6b6508f16febf59c62ce0d8b9142e406d1

  • SHA512

    095a765b4bab2de2d63ff8fa9e2972321f021e8fe46a0ad1cdf4173f8d44d08bcb82ef2c7eb56d8ece25f5651a292f11eb12d6d78c7547799bd1b847e0d570ad

  • SSDEEP

    3072:nar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Rs4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e0b4b0420ea9a10f8378a4c8afeb1a6b6508f16febf59c62ce0d8b9142e406d1

    • Size

      163KB

    • MD5

      22535da16e9b540e5de60ce41a3583f9

    • SHA1

      96ed80ef68fe14afc31f40ad27230637f806fa00

    • SHA256

      e0b4b0420ea9a10f8378a4c8afeb1a6b6508f16febf59c62ce0d8b9142e406d1

    • SHA512

      095a765b4bab2de2d63ff8fa9e2972321f021e8fe46a0ad1cdf4173f8d44d08bcb82ef2c7eb56d8ece25f5651a292f11eb12d6d78c7547799bd1b847e0d570ad

    • SSDEEP

      3072:nar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:Rs4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks