General

  • Target

    JaffaCakes118_499d98a6f38fab1e69bce0b623e9d633b0d79ccb22d98b3802d5d5a3ce1e87b4

  • Size

    163KB

  • Sample

    241230-x1ph8avken

  • MD5

    b88fa4c8ece646a622fdc5cbb330812c

  • SHA1

    7493e1aceb4a45d22de3bf6366877eef53cbdd70

  • SHA256

    499d98a6f38fab1e69bce0b623e9d633b0d79ccb22d98b3802d5d5a3ce1e87b4

  • SHA512

    732cf5f9e3f76de9fa2f4a638ee87b6bccb0109d781e18f249116f4c97a07a5329519b04feec9768ef32819539d08adc144407886f3c6425c1a298508e567ffc

  • SSDEEP

    3072:T9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:T9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_499d98a6f38fab1e69bce0b623e9d633b0d79ccb22d98b3802d5d5a3ce1e87b4

    • Size

      163KB

    • MD5

      b88fa4c8ece646a622fdc5cbb330812c

    • SHA1

      7493e1aceb4a45d22de3bf6366877eef53cbdd70

    • SHA256

      499d98a6f38fab1e69bce0b623e9d633b0d79ccb22d98b3802d5d5a3ce1e87b4

    • SHA512

      732cf5f9e3f76de9fa2f4a638ee87b6bccb0109d781e18f249116f4c97a07a5329519b04feec9768ef32819539d08adc144407886f3c6425c1a298508e567ffc

    • SSDEEP

      3072:T9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:T9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks