General

  • Target

    JaffaCakes118_e5675135b339987afa3ea8a4b5312bd179e150c26fababfae439ff65363ac462

  • Size

    171KB

  • Sample

    241230-vqd9dssrd1

  • MD5

    4ff4f29c3e60135465c5bae09ae26bce

  • SHA1

    a6f6fe831334ec82b7ccd8e9ac8123377eb7a4e5

  • SHA256

    e5675135b339987afa3ea8a4b5312bd179e150c26fababfae439ff65363ac462

  • SHA512

    6d52cb525820caec0be1a17305204d437eae82ff591dfcf773a1a8dcbd2cc2bf808db00de873bf7cd467aa7603911dd678cdb7d2e40391d4090b466e074e7225

  • SSDEEP

    3072:oi49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:oH9RVaPEmsdHdbQUbd2H3

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

128.199.200.38:443

192.163.233.216:6601

43.229.206.244:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e5675135b339987afa3ea8a4b5312bd179e150c26fababfae439ff65363ac462

    • Size

      171KB

    • MD5

      4ff4f29c3e60135465c5bae09ae26bce

    • SHA1

      a6f6fe831334ec82b7ccd8e9ac8123377eb7a4e5

    • SHA256

      e5675135b339987afa3ea8a4b5312bd179e150c26fababfae439ff65363ac462

    • SHA512

      6d52cb525820caec0be1a17305204d437eae82ff591dfcf773a1a8dcbd2cc2bf808db00de873bf7cd467aa7603911dd678cdb7d2e40391d4090b466e074e7225

    • SSDEEP

      3072:oi49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:oH9RVaPEmsdHdbQUbd2H3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks