General

  • Target

    JaffaCakes118_19cb01953776a62811232da5c0336a135c0601c9ed816666a25b83b4b871e423

  • Size

    161KB

  • Sample

    241224-c9gjrazlhy

  • MD5

    4276c39206ec69affe86fe02ba58f620

  • SHA1

    9660f2d0db3d1c61c720b062c26c0767e82b8951

  • SHA256

    19cb01953776a62811232da5c0336a135c0601c9ed816666a25b83b4b871e423

  • SHA512

    a0a2c2762c4914b8c640231be9462a02096a19ebc113b8c5cd4fbf623fc138f4106ff0ceb00ac456a156c89a315230a05f81d69733546696865c53c9ca6d10aa

  • SSDEEP

    3072:8L45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:s4KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_19cb01953776a62811232da5c0336a135c0601c9ed816666a25b83b4b871e423

    • Size

      161KB

    • MD5

      4276c39206ec69affe86fe02ba58f620

    • SHA1

      9660f2d0db3d1c61c720b062c26c0767e82b8951

    • SHA256

      19cb01953776a62811232da5c0336a135c0601c9ed816666a25b83b4b871e423

    • SHA512

      a0a2c2762c4914b8c640231be9462a02096a19ebc113b8c5cd4fbf623fc138f4106ff0ceb00ac456a156c89a315230a05f81d69733546696865c53c9ca6d10aa

    • SSDEEP

      3072:8L45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:s4KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks