General

  • Target

    e4c1132365fa744a4d81c171145015a7_JaffaCakes118

  • Size

    184KB

  • Sample

    240407-mz4xeabb21

  • MD5

    e4c1132365fa744a4d81c171145015a7

  • SHA1

    33202325f1c19c485ec880daaa01b7d43283a043

  • SHA256

    de19e11ad2fe7b2a49a71d46ed6df511a2d6ace19a579d7cc7febdbbd5905e21

  • SHA512

    9bf604e8c578ae3ce9f88fc507d9cedcd7dfa371378496cd1441d04566912ae8c046a3daa83db4647c36a6bcfa9f32ef130ad4dff845d8e9e83f2d4a603ab80c

  • SSDEEP

    3072:Lhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JfVQcY:L3fOeIv54W6SFKfc9me9v9/JfV

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

51.79.50.122:443

222.124.142.67:10443

138.201.222.158:4664

rc4.plain
rc4.plain

Targets

    • Target

      e4c1132365fa744a4d81c171145015a7_JaffaCakes118

    • Size

      184KB

    • MD5

      e4c1132365fa744a4d81c171145015a7

    • SHA1

      33202325f1c19c485ec880daaa01b7d43283a043

    • SHA256

      de19e11ad2fe7b2a49a71d46ed6df511a2d6ace19a579d7cc7febdbbd5905e21

    • SHA512

      9bf604e8c578ae3ce9f88fc507d9cedcd7dfa371378496cd1441d04566912ae8c046a3daa83db4647c36a6bcfa9f32ef130ad4dff845d8e9e83f2d4a603ab80c

    • SSDEEP

      3072:Lhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JfVQcY:L3fOeIv54W6SFKfc9me9v9/JfV

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks