General

  • Target

    JaffaCakes118_5ac3c1b5e95d48e15c203e08f2020284b51508061d4527d4c76de47d09dac484

  • Size

    178KB

  • Sample

    241224-dgxwpszpav

  • MD5

    d390d96544de61eaede7e683ee386ff0

  • SHA1

    53e7e5f680507a8f4815cbe365e8e632d40e1096

  • SHA256

    5ac3c1b5e95d48e15c203e08f2020284b51508061d4527d4c76de47d09dac484

  • SHA512

    0024a616c88622b2313f5fda969cc1eeb504cedf2528a2067d790e8586bf5a6d7be8b35f3f3ca55011bde27e77b37e62e12d8489effd49d20f611166edd2c572

  • SSDEEP

    3072:xZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:xUAk9I4vgz/V2dulz6/hvOhG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

142.93.223.149:443

128.199.36.62:4664

50.116.54.215:13786

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5ac3c1b5e95d48e15c203e08f2020284b51508061d4527d4c76de47d09dac484

    • Size

      178KB

    • MD5

      d390d96544de61eaede7e683ee386ff0

    • SHA1

      53e7e5f680507a8f4815cbe365e8e632d40e1096

    • SHA256

      5ac3c1b5e95d48e15c203e08f2020284b51508061d4527d4c76de47d09dac484

    • SHA512

      0024a616c88622b2313f5fda969cc1eeb504cedf2528a2067d790e8586bf5a6d7be8b35f3f3ca55011bde27e77b37e62e12d8489effd49d20f611166edd2c572

    • SSDEEP

      3072:xZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:xUAk9I4vgz/V2dulz6/hvOhG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks