General

  • Target

    JaffaCakes118_71d1f61ff6379758b510ec593243a84ccc717708f901ff0c8df2b4127242ee7b

  • Size

    166KB

  • Sample

    241230-wyncpssndk

  • MD5

    d1634da333fc207dd0b403c0a87f4f9c

  • SHA1

    b875097566c250c2c4b887ca5ffb8f31099e2356

  • SHA256

    71d1f61ff6379758b510ec593243a84ccc717708f901ff0c8df2b4127242ee7b

  • SHA512

    22fa713da231bfde82d80f02f357fbf65dc36febd72441eed765b8252c9a42cbf14cfd4cb8795c721ce3b1d49c5f3b4aeb23da95b61d803abbf9d5e5d7efccdb

  • SSDEEP

    3072:pBoQctVOM7/8wZQvUlM7EF+V2xReSbHNjztUJQ8eHqE:3uXLcclWEc2HeSjNjGdeKE

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_71d1f61ff6379758b510ec593243a84ccc717708f901ff0c8df2b4127242ee7b

    • Size

      166KB

    • MD5

      d1634da333fc207dd0b403c0a87f4f9c

    • SHA1

      b875097566c250c2c4b887ca5ffb8f31099e2356

    • SHA256

      71d1f61ff6379758b510ec593243a84ccc717708f901ff0c8df2b4127242ee7b

    • SHA512

      22fa713da231bfde82d80f02f357fbf65dc36febd72441eed765b8252c9a42cbf14cfd4cb8795c721ce3b1d49c5f3b4aeb23da95b61d803abbf9d5e5d7efccdb

    • SSDEEP

      3072:pBoQctVOM7/8wZQvUlM7EF+V2xReSbHNjztUJQ8eHqE:3uXLcclWEc2HeSjNjGdeKE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks