General

  • Target

    JaffaCakes118_53b5578593b18dafdc6a04b1497d6b2a31c9ca12c92f87f28380db66840dc03e

  • Size

    161KB

  • Sample

    241223-zb3qnazqct

  • MD5

    cc17ec242c0f6ed0fbff0ffe98c5c4d3

  • SHA1

    a59ef8303b1485bfd2a6c923ad0c2725a86d3794

  • SHA256

    53b5578593b18dafdc6a04b1497d6b2a31c9ca12c92f87f28380db66840dc03e

  • SHA512

    17a881d76b5a5069e8f64d18493b7f7798a0a19d7b3c214474ebd5e357674533f7bb58a7f89059bf8cbe93516b40fa2613cfd0090a736c963aaf928c473b4551

  • SSDEEP

    3072:CQ45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:p4KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_53b5578593b18dafdc6a04b1497d6b2a31c9ca12c92f87f28380db66840dc03e

    • Size

      161KB

    • MD5

      cc17ec242c0f6ed0fbff0ffe98c5c4d3

    • SHA1

      a59ef8303b1485bfd2a6c923ad0c2725a86d3794

    • SHA256

      53b5578593b18dafdc6a04b1497d6b2a31c9ca12c92f87f28380db66840dc03e

    • SHA512

      17a881d76b5a5069e8f64d18493b7f7798a0a19d7b3c214474ebd5e357674533f7bb58a7f89059bf8cbe93516b40fa2613cfd0090a736c963aaf928c473b4551

    • SSDEEP

      3072:CQ45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:p4KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks