General

  • Target

    JaffaCakes118_9779443586c986e2b2a973a774138e2c3836289dea75a8da4edfaeccaeb33a73

  • Size

    161KB

  • Sample

    241221-w1rg5swjdz

  • MD5

    03f540829fb5c450380ae95d26a45c21

  • SHA1

    92fc542edf7b36374acb5f9ffde70367e90b3a83

  • SHA256

    9779443586c986e2b2a973a774138e2c3836289dea75a8da4edfaeccaeb33a73

  • SHA512

    aa59e88d56c5c08e8bf99e2c1a57f447c5dd8902b247304169481f475bc5cfc6037ae2be21b3bdf7b34ba05884eae314418da11f9294d062a64fa4be522c1016

  • SSDEEP

    3072:Xm4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:VDBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9779443586c986e2b2a973a774138e2c3836289dea75a8da4edfaeccaeb33a73

    • Size

      161KB

    • MD5

      03f540829fb5c450380ae95d26a45c21

    • SHA1

      92fc542edf7b36374acb5f9ffde70367e90b3a83

    • SHA256

      9779443586c986e2b2a973a774138e2c3836289dea75a8da4edfaeccaeb33a73

    • SHA512

      aa59e88d56c5c08e8bf99e2c1a57f447c5dd8902b247304169481f475bc5cfc6037ae2be21b3bdf7b34ba05884eae314418da11f9294d062a64fa4be522c1016

    • SSDEEP

      3072:Xm4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:VDBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks