General

  • Target

    JaffaCakes118_5d48cc3c77b00c6a7a97bd013fa4f4b7973b80cef89f30e63accd91f0f41d333

  • Size

    162KB

  • Sample

    241223-1sw5wasphq

  • MD5

    167d43b8df6d3133b335e4c54f0f7f1b

  • SHA1

    1ac49844ea28410be326ac62349cff515edebc88

  • SHA256

    5d48cc3c77b00c6a7a97bd013fa4f4b7973b80cef89f30e63accd91f0f41d333

  • SHA512

    6f3658ed7018d773452186764b9726d7cdd6ae0f48bbf7e71e707cc76572c2d4f9fe53527a72d93900ecaf0b9926abf07059f32797098e72c39ba9e5ecb9daed

  • SSDEEP

    3072:1esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLiV:x4+VZQpt5hyPsa1ekiE9V

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5d48cc3c77b00c6a7a97bd013fa4f4b7973b80cef89f30e63accd91f0f41d333

    • Size

      162KB

    • MD5

      167d43b8df6d3133b335e4c54f0f7f1b

    • SHA1

      1ac49844ea28410be326ac62349cff515edebc88

    • SHA256

      5d48cc3c77b00c6a7a97bd013fa4f4b7973b80cef89f30e63accd91f0f41d333

    • SHA512

      6f3658ed7018d773452186764b9726d7cdd6ae0f48bbf7e71e707cc76572c2d4f9fe53527a72d93900ecaf0b9926abf07059f32797098e72c39ba9e5ecb9daed

    • SSDEEP

      3072:1esl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLiV:x4+VZQpt5hyPsa1ekiE9V

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks