General

  • Target

    JaffaCakes118_e8e7637ff2fd67f8c8d224b3f51fe18a6f243fcc17e87b809f40e788edf33ee3

  • Size

    163KB

  • Sample

    241230-f1krlayrfq

  • MD5

    72e1655abe516f6644275fe46041c05d

  • SHA1

    2c23ab8c2c7cb1c86565669a497447ce948c7039

  • SHA256

    e8e7637ff2fd67f8c8d224b3f51fe18a6f243fcc17e87b809f40e788edf33ee3

  • SHA512

    c863355138cd98070910c26f1240fe7c4671bdbb0b50e995238f39069421ef1f215df50eda8c6ffcd8cc54c6beca16fb3c9e0b138999d72f2d5ed9bdb4110afe

  • SSDEEP

    3072:o9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:o9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e8e7637ff2fd67f8c8d224b3f51fe18a6f243fcc17e87b809f40e788edf33ee3

    • Size

      163KB

    • MD5

      72e1655abe516f6644275fe46041c05d

    • SHA1

      2c23ab8c2c7cb1c86565669a497447ce948c7039

    • SHA256

      e8e7637ff2fd67f8c8d224b3f51fe18a6f243fcc17e87b809f40e788edf33ee3

    • SHA512

      c863355138cd98070910c26f1240fe7c4671bdbb0b50e995238f39069421ef1f215df50eda8c6ffcd8cc54c6beca16fb3c9e0b138999d72f2d5ed9bdb4110afe

    • SSDEEP

      3072:o9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:o9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks