General

  • Target

    JaffaCakes118_bcfba6a0cf953b4b719b69e1eca905c8bd547cad70f12cef1cbd60571680fce2

  • Size

    163KB

  • Sample

    241230-efr5haxmcw

  • MD5

    924f62f090df23163a2bcccb29ec13e4

  • SHA1

    42f36be31cf304e0f42b44475ca209560fac318a

  • SHA256

    bcfba6a0cf953b4b719b69e1eca905c8bd547cad70f12cef1cbd60571680fce2

  • SHA512

    084153a7a9753f9cb902e828583179f3aca0b1aba63a5a95f1803b8c17a8f1c22ea0f5f3e475e5e86402f70145990bb8243cd2cda96ac700da00851dd53ee046

  • SSDEEP

    3072:V9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:V9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bcfba6a0cf953b4b719b69e1eca905c8bd547cad70f12cef1cbd60571680fce2

    • Size

      163KB

    • MD5

      924f62f090df23163a2bcccb29ec13e4

    • SHA1

      42f36be31cf304e0f42b44475ca209560fac318a

    • SHA256

      bcfba6a0cf953b4b719b69e1eca905c8bd547cad70f12cef1cbd60571680fce2

    • SHA512

      084153a7a9753f9cb902e828583179f3aca0b1aba63a5a95f1803b8c17a8f1c22ea0f5f3e475e5e86402f70145990bb8243cd2cda96ac700da00851dd53ee046

    • SSDEEP

      3072:V9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:V9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks