General

  • Target

    JaffaCakes118_d4b04e5941290cf30b43e0e71c7ecc2dbad2137622c73958d47f1b74d04f8b78

  • Size

    163KB

  • Sample

    241230-gxksvszrew

  • MD5

    416dfc62551b6a9a00574c6dd2e8f2f2

  • SHA1

    653769621fae93228e9ce75d9973d674cfd87988

  • SHA256

    d4b04e5941290cf30b43e0e71c7ecc2dbad2137622c73958d47f1b74d04f8b78

  • SHA512

    5d3912c05e68bc7815d0bb03d44851d2278a4b891c76b5a2d61363e7efcff97d4d9fdc3ccbde2882afd52076243b46c7385e7ad17e6fb6fb98bd4557dce62716

  • SSDEEP

    3072:ct9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:ct9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d4b04e5941290cf30b43e0e71c7ecc2dbad2137622c73958d47f1b74d04f8b78

    • Size

      163KB

    • MD5

      416dfc62551b6a9a00574c6dd2e8f2f2

    • SHA1

      653769621fae93228e9ce75d9973d674cfd87988

    • SHA256

      d4b04e5941290cf30b43e0e71c7ecc2dbad2137622c73958d47f1b74d04f8b78

    • SHA512

      5d3912c05e68bc7815d0bb03d44851d2278a4b891c76b5a2d61363e7efcff97d4d9fdc3ccbde2882afd52076243b46c7385e7ad17e6fb6fb98bd4557dce62716

    • SSDEEP

      3072:ct9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:ct9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks