General

  • Target

    JaffaCakes118_92e0fc9b27672fb67d5d01fbac9eec7124f368bd55a7e3f228a825a3d32222b7

  • Size

    166KB

  • Sample

    241230-gw5fwazrdz

  • MD5

    21d1ee35146a54437226ae4e1a615ad6

  • SHA1

    dc0284acbe8831d6cc1bfbd3fe84ee934e68fa9f

  • SHA256

    92e0fc9b27672fb67d5d01fbac9eec7124f368bd55a7e3f228a825a3d32222b7

  • SHA512

    fd3a35b852d6c7d0545b7a8a45259f8415f76e26720ddda817e39d6b3d37041e4b203289194e195190ca2ae2df70e2a20e1f8cb9fc4338a885b31843c15eb136

  • SSDEEP

    3072:0uFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+jN:00czbty9uiaJlqN

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_92e0fc9b27672fb67d5d01fbac9eec7124f368bd55a7e3f228a825a3d32222b7

    • Size

      166KB

    • MD5

      21d1ee35146a54437226ae4e1a615ad6

    • SHA1

      dc0284acbe8831d6cc1bfbd3fe84ee934e68fa9f

    • SHA256

      92e0fc9b27672fb67d5d01fbac9eec7124f368bd55a7e3f228a825a3d32222b7

    • SHA512

      fd3a35b852d6c7d0545b7a8a45259f8415f76e26720ddda817e39d6b3d37041e4b203289194e195190ca2ae2df70e2a20e1f8cb9fc4338a885b31843c15eb136

    • SSDEEP

      3072:0uFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+jN:00czbty9uiaJlqN

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks