General

  • Target

    JaffaCakes118_39f699d7f00b443de504c1909ac8b397c2d4a96e95110b570563dc1637dbf01f

  • Size

    162KB

  • Sample

    241230-dfyfvawlbs

  • MD5

    4334bf8a68908bc3380ec3374fa7ea11

  • SHA1

    cec1ade6f17b4fdde24bce331043f8058df2555f

  • SHA256

    39f699d7f00b443de504c1909ac8b397c2d4a96e95110b570563dc1637dbf01f

  • SHA512

    9e23d4b3de52918957d3265b91ea40cd813b7a37ff6a26f65abb897367c5f4d458c689e262b6f82925f4285fb6275e21c251e6904f17075b69138a665e75ca1b

  • SSDEEP

    3072:1esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:x4+VZQpt5hyPsa1ekiEyL

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_39f699d7f00b443de504c1909ac8b397c2d4a96e95110b570563dc1637dbf01f

    • Size

      162KB

    • MD5

      4334bf8a68908bc3380ec3374fa7ea11

    • SHA1

      cec1ade6f17b4fdde24bce331043f8058df2555f

    • SHA256

      39f699d7f00b443de504c1909ac8b397c2d4a96e95110b570563dc1637dbf01f

    • SHA512

      9e23d4b3de52918957d3265b91ea40cd813b7a37ff6a26f65abb897367c5f4d458c689e262b6f82925f4285fb6275e21c251e6904f17075b69138a665e75ca1b

    • SSDEEP

      3072:1esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLJL:x4+VZQpt5hyPsa1ekiEyL

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks