General

  • Target

    JaffaCakes118_d06022122f1395b990eab02ff0e69b994cde5c396eedabc65830050b8feb273c

  • Size

    163KB

  • Sample

    241230-vmvrzazqgp

  • MD5

    66a3aea46a635d54d5c6c07fb7f7d779

  • SHA1

    74c710f4832a4fbbe783cd64fa3f152c9ed9d2ce

  • SHA256

    d06022122f1395b990eab02ff0e69b994cde5c396eedabc65830050b8feb273c

  • SHA512

    2c5990af681fb9d272ff95e256e0dd940fc8eb9b4ce81987a8d74200a12afdf2f91b2952c77e22d44cb0de168872cde34afd0eec4dd4e5ea68844d40ce8e40b7

  • SSDEEP

    3072:Q9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:Q9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d06022122f1395b990eab02ff0e69b994cde5c396eedabc65830050b8feb273c

    • Size

      163KB

    • MD5

      66a3aea46a635d54d5c6c07fb7f7d779

    • SHA1

      74c710f4832a4fbbe783cd64fa3f152c9ed9d2ce

    • SHA256

      d06022122f1395b990eab02ff0e69b994cde5c396eedabc65830050b8feb273c

    • SHA512

      2c5990af681fb9d272ff95e256e0dd940fc8eb9b4ce81987a8d74200a12afdf2f91b2952c77e22d44cb0de168872cde34afd0eec4dd4e5ea68844d40ce8e40b7

    • SSDEEP

      3072:Q9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:Q9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks