General

  • Target

    JaffaCakes118_8e74f5dfeb1fe324e45cc736450ca680063bcaf22be886ef0f86eeac826f513e

  • Size

    161KB

  • Sample

    241224-cpvwmsypcw

  • MD5

    270b63a33f40150d2ac41992c48baf6e

  • SHA1

    82734d854a3a75e99033f45e92123e0cd7180733

  • SHA256

    8e74f5dfeb1fe324e45cc736450ca680063bcaf22be886ef0f86eeac826f513e

  • SHA512

    01acbd5265c67dc109265f34cfd694a067700b13ff2cea1224f71369bbc7ce7c84372220e3afd66aad9ead1b9691b8e36ccc68731e3b79c41ab1d79ec7e7fb0c

  • SSDEEP

    3072:qx45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:E4KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8e74f5dfeb1fe324e45cc736450ca680063bcaf22be886ef0f86eeac826f513e

    • Size

      161KB

    • MD5

      270b63a33f40150d2ac41992c48baf6e

    • SHA1

      82734d854a3a75e99033f45e92123e0cd7180733

    • SHA256

      8e74f5dfeb1fe324e45cc736450ca680063bcaf22be886ef0f86eeac826f513e

    • SHA512

      01acbd5265c67dc109265f34cfd694a067700b13ff2cea1224f71369bbc7ce7c84372220e3afd66aad9ead1b9691b8e36ccc68731e3b79c41ab1d79ec7e7fb0c

    • SSDEEP

      3072:qx45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:E4KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks