General

  • Target

    JaffaCakes118_521d05303a3f43b43f899ce752cd62e1ebb687fbad630d8af6455c96608e8cc8

  • Size

    163KB

  • Sample

    241230-x2e16svkhn

  • MD5

    5704364025aa376f1ac7a9574f88ed48

  • SHA1

    a0ed503bdb5ec89016405b5f6da909de4b97d843

  • SHA256

    521d05303a3f43b43f899ce752cd62e1ebb687fbad630d8af6455c96608e8cc8

  • SHA512

    6adf640e41ebc038d32c9d26b6c4e83dd8de7e07dff582bf719d56801d1778579b9e2e17990ef3c1df449871531a55d760f7f602fb906f2a386f09729ad8eff4

  • SSDEEP

    3072:g9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:g9F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_521d05303a3f43b43f899ce752cd62e1ebb687fbad630d8af6455c96608e8cc8

    • Size

      163KB

    • MD5

      5704364025aa376f1ac7a9574f88ed48

    • SHA1

      a0ed503bdb5ec89016405b5f6da909de4b97d843

    • SHA256

      521d05303a3f43b43f899ce752cd62e1ebb687fbad630d8af6455c96608e8cc8

    • SHA512

      6adf640e41ebc038d32c9d26b6c4e83dd8de7e07dff582bf719d56801d1778579b9e2e17990ef3c1df449871531a55d760f7f602fb906f2a386f09729ad8eff4

    • SSDEEP

      3072:g9F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:g9F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks