General

  • Target

    JaffaCakes118_f2926904c9132d446756f2c74e2c8ffaf67ffb9ed014b87d212d983157e00be4

  • Size

    166KB

  • Sample

    241230-xr5tvatqen

  • MD5

    97a784814a371f9110a3395385fd6bed

  • SHA1

    eb40145924bbdfe85970abcc346d5e90dbdd239f

  • SHA256

    f2926904c9132d446756f2c74e2c8ffaf67ffb9ed014b87d212d983157e00be4

  • SHA512

    21be9bbde00d2b299bce69bfde81f9fde9de1f5b70d65e3f800e7825b2c9ca8822348ae79898f0a2258d57e98d0764bda3f973c15a75dad4072db02d7745d049

  • SSDEEP

    3072:CBoQc0M7/8wZQvUlM7EF+V2xReSbHNjztUJQ8eHPD:CuhcclWEc2HeSjNjGdevD

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f2926904c9132d446756f2c74e2c8ffaf67ffb9ed014b87d212d983157e00be4

    • Size

      166KB

    • MD5

      97a784814a371f9110a3395385fd6bed

    • SHA1

      eb40145924bbdfe85970abcc346d5e90dbdd239f

    • SHA256

      f2926904c9132d446756f2c74e2c8ffaf67ffb9ed014b87d212d983157e00be4

    • SHA512

      21be9bbde00d2b299bce69bfde81f9fde9de1f5b70d65e3f800e7825b2c9ca8822348ae79898f0a2258d57e98d0764bda3f973c15a75dad4072db02d7745d049

    • SSDEEP

      3072:CBoQc0M7/8wZQvUlM7EF+V2xReSbHNjztUJQ8eHPD:CuhcclWEc2HeSjNjGdevD

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks