General

  • Target

    JaffaCakes118_bc59cf04a2132e7c0e3c2b12f20a2d557e5813c1ae9c9e0d065a0f55af71a8d1

  • Size

    161KB

  • Sample

    241223-ytbjfszlck

  • MD5

    6c58b28660323d1559ba6d40628989c1

  • SHA1

    6271eee9c61c40bae3d9bf28d616ad965d5818b7

  • SHA256

    bc59cf04a2132e7c0e3c2b12f20a2d557e5813c1ae9c9e0d065a0f55af71a8d1

  • SHA512

    f2508bcf5dcc27f5cc0747b432e1ecc2f849ba1e79d0e4d0041eae9e64ad5094b83b7c67c42876e348a0de8b84ef4ad9c7a36df49d94cd249028f17b2a85e7b2

  • SSDEEP

    3072:dv4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:CDBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bc59cf04a2132e7c0e3c2b12f20a2d557e5813c1ae9c9e0d065a0f55af71a8d1

    • Size

      161KB

    • MD5

      6c58b28660323d1559ba6d40628989c1

    • SHA1

      6271eee9c61c40bae3d9bf28d616ad965d5818b7

    • SHA256

      bc59cf04a2132e7c0e3c2b12f20a2d557e5813c1ae9c9e0d065a0f55af71a8d1

    • SHA512

      f2508bcf5dcc27f5cc0747b432e1ecc2f849ba1e79d0e4d0041eae9e64ad5094b83b7c67c42876e348a0de8b84ef4ad9c7a36df49d94cd249028f17b2a85e7b2

    • SSDEEP

      3072:dv4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:CDBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks