General

  • Target

    JaffaCakes118_75e6c026bd0d8ac048d876d32dd823bd4d7d8372f72d2c14c1381e8f9b3bdd29

  • Size

    161KB

  • Sample

    241223-159xhatkhn

  • MD5

    718329049a157182820efdc294bbbcff

  • SHA1

    833340cfae107a55d3927d81324ed95a92cef289

  • SHA256

    75e6c026bd0d8ac048d876d32dd823bd4d7d8372f72d2c14c1381e8f9b3bdd29

  • SHA512

    74a1bbbf68d13e987c66df0cf2e0b92b9e2dd5dcdc7231c6724d6b3f841a76d051f59a418e0574e844f8df5352268acc34eea6686dc38e470bcca5b0f85cfdeb

  • SSDEEP

    3072:YK4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:2DBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_75e6c026bd0d8ac048d876d32dd823bd4d7d8372f72d2c14c1381e8f9b3bdd29

    • Size

      161KB

    • MD5

      718329049a157182820efdc294bbbcff

    • SHA1

      833340cfae107a55d3927d81324ed95a92cef289

    • SHA256

      75e6c026bd0d8ac048d876d32dd823bd4d7d8372f72d2c14c1381e8f9b3bdd29

    • SHA512

      74a1bbbf68d13e987c66df0cf2e0b92b9e2dd5dcdc7231c6724d6b3f841a76d051f59a418e0574e844f8df5352268acc34eea6686dc38e470bcca5b0f85cfdeb

    • SSDEEP

      3072:YK4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:2DBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks