General

  • Target

    JaffaCakes118_42b38707c56802d07c7edcb8cf01d6c542cbd9786d34f70c18aa534f2432dca0

  • Size

    163KB

  • Sample

    241230-fh746synas

  • MD5

    b2e990059185a6ad00e7bdaf6de69b04

  • SHA1

    d7453011f645be87912ca30a5f8807b76f830518

  • SHA256

    42b38707c56802d07c7edcb8cf01d6c542cbd9786d34f70c18aa534f2432dca0

  • SHA512

    dc2fdfbb3ab47ab1bda9e1fffdaf962504ff6660c2bb6e6fabceec60f219dc7e9e96e6f6898494e1bd58a9278dcd46485d4dce1fc57150a623b6e8d7d925de35

  • SSDEEP

    3072:rar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ds4p+ADxnSO6D2cOp

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_42b38707c56802d07c7edcb8cf01d6c542cbd9786d34f70c18aa534f2432dca0

    • Size

      163KB

    • MD5

      b2e990059185a6ad00e7bdaf6de69b04

    • SHA1

      d7453011f645be87912ca30a5f8807b76f830518

    • SHA256

      42b38707c56802d07c7edcb8cf01d6c542cbd9786d34f70c18aa534f2432dca0

    • SHA512

      dc2fdfbb3ab47ab1bda9e1fffdaf962504ff6660c2bb6e6fabceec60f219dc7e9e96e6f6898494e1bd58a9278dcd46485d4dce1fc57150a623b6e8d7d925de35

    • SSDEEP

      3072:rar6Ys6p54kfdo+APr0aYSbeO6aal8jeytFQTOpp2J:ds4p+ADxnSO6D2cOp

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks