General

  • Target

    JaffaCakes118_ef3b74c61bce667054e0130f31e9fd1142a583135b3ac4c79093bd16b5328187

  • Size

    163KB

  • Sample

    241230-zyrxns1pfz

  • MD5

    14ed8f8766e04987251d81a6d7f32970

  • SHA1

    2f6a9252f005615f30024fea1e27d18d23488556

  • SHA256

    ef3b74c61bce667054e0130f31e9fd1142a583135b3ac4c79093bd16b5328187

  • SHA512

    b9c5a2aeedc97d220f4f8b5b82b196d2918ceeefa8e98b2f057090a419f52aa0cba6ead7176484764c76166cc4862568a9baa01425713fd23df734ea20ef1cb3

  • SSDEEP

    3072:99F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:99F6rQXvFczvYpQP

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

43.229.206.212:443

82.209.17.209:8172

162.241.209.225:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ef3b74c61bce667054e0130f31e9fd1142a583135b3ac4c79093bd16b5328187

    • Size

      163KB

    • MD5

      14ed8f8766e04987251d81a6d7f32970

    • SHA1

      2f6a9252f005615f30024fea1e27d18d23488556

    • SHA256

      ef3b74c61bce667054e0130f31e9fd1142a583135b3ac4c79093bd16b5328187

    • SHA512

      b9c5a2aeedc97d220f4f8b5b82b196d2918ceeefa8e98b2f057090a419f52aa0cba6ead7176484764c76166cc4862568a9baa01425713fd23df734ea20ef1cb3

    • SSDEEP

      3072:99F/oNrQb4xVubbXP/NTccbsFvCeLmXH57V30e8Pj:99F6rQXvFczvYpQP

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks