General

  • Target

    JaffaCakes118_ece2a476f73db5bbaf140327153a865e3e5722c46695bc951e6ca4b3ab1e3bfa

  • Size

    163KB

  • Sample

    241230-g6qqga1jhw

  • MD5

    6909705e89716cb25215326cc6605e8c

  • SHA1

    f770f6e3135f028dc8cd203b43541e6f46d03a25

  • SHA256

    ece2a476f73db5bbaf140327153a865e3e5722c46695bc951e6ca4b3ab1e3bfa

  • SHA512

    70bea51e90ff908e091e298a16d42f49384928d0a18fd9efaae6b2252c634e80b253c703d025479649b2a0f59c999625d834628e4d595665251e8290a479f79b

  • SSDEEP

    3072:L9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:L9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ece2a476f73db5bbaf140327153a865e3e5722c46695bc951e6ca4b3ab1e3bfa

    • Size

      163KB

    • MD5

      6909705e89716cb25215326cc6605e8c

    • SHA1

      f770f6e3135f028dc8cd203b43541e6f46d03a25

    • SHA256

      ece2a476f73db5bbaf140327153a865e3e5722c46695bc951e6ca4b3ab1e3bfa

    • SHA512

      70bea51e90ff908e091e298a16d42f49384928d0a18fd9efaae6b2252c634e80b253c703d025479649b2a0f59c999625d834628e4d595665251e8290a479f79b

    • SSDEEP

      3072:L9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:L9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks