General

  • Target

    JaffaCakes118_84379743dc06452aa35ca7a27cac5d66c8aba03814ab37de858235b1e2e95091

  • Size

    178KB

  • Sample

    241223-zdyvgszrgl

  • MD5

    7657e43a88179ea5282a273c50113ae1

  • SHA1

    ff709049f3ebdd3bedd16dbeb3be6c3581a62337

  • SHA256

    84379743dc06452aa35ca7a27cac5d66c8aba03814ab37de858235b1e2e95091

  • SHA512

    31d9d242443d9ba98d67453fac39c30d8d23faa325e2cb8980699d6d7cce4a1cc763d498a9539dfbe1063eafff124e7feeea98bd579db74b1c60ba144d7a68c2

  • SSDEEP

    3072:sZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtuUucGZ2:sUAk9I4vgz/V2dulz6/hvHhG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

142.93.223.149:443

128.199.36.62:4664

50.116.54.215:13786

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_84379743dc06452aa35ca7a27cac5d66c8aba03814ab37de858235b1e2e95091

    • Size

      178KB

    • MD5

      7657e43a88179ea5282a273c50113ae1

    • SHA1

      ff709049f3ebdd3bedd16dbeb3be6c3581a62337

    • SHA256

      84379743dc06452aa35ca7a27cac5d66c8aba03814ab37de858235b1e2e95091

    • SHA512

      31d9d242443d9ba98d67453fac39c30d8d23faa325e2cb8980699d6d7cce4a1cc763d498a9539dfbe1063eafff124e7feeea98bd579db74b1c60ba144d7a68c2

    • SSDEEP

      3072:sZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtuUucGZ2:sUAk9I4vgz/V2dulz6/hvHhG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks