General

  • Target

    JaffaCakes118_cbc71e7e69735ac2f88dce6b97bdb26626c603f56ff99c2911c39d82f8bcf212

  • Size

    161KB

  • Sample

    241223-2xe8lavjdn

  • MD5

    26f484628e0f08818c7deb047c6a2b8f

  • SHA1

    32cbda0ba0d3498055d2930b7d06cbc5bef97a71

  • SHA256

    cbc71e7e69735ac2f88dce6b97bdb26626c603f56ff99c2911c39d82f8bcf212

  • SHA512

    b77713b5fe5f14f88fa35f50f63705a4f8614c8d8f126a411ea07c051b5241fd13d84d5a30927b272c634788ea867c56fa38f944e89da34e77673d9b5c10fd01

  • SSDEEP

    3072:Dy45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:24KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cbc71e7e69735ac2f88dce6b97bdb26626c603f56ff99c2911c39d82f8bcf212

    • Size

      161KB

    • MD5

      26f484628e0f08818c7deb047c6a2b8f

    • SHA1

      32cbda0ba0d3498055d2930b7d06cbc5bef97a71

    • SHA256

      cbc71e7e69735ac2f88dce6b97bdb26626c603f56ff99c2911c39d82f8bcf212

    • SHA512

      b77713b5fe5f14f88fa35f50f63705a4f8614c8d8f126a411ea07c051b5241fd13d84d5a30927b272c634788ea867c56fa38f944e89da34e77673d9b5c10fd01

    • SSDEEP

      3072:Dy45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:24KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks