General

  • Target

    JaffaCakes118_67ab0ca80c2d43d2909fce50445a63747ea98817d52c1e28fb5de3741847d4dc

  • Size

    171KB

  • Sample

    241224-dv3dca1ldp

  • MD5

    7dd8b295f6d1757b7ad0fc4fc0b65b91

  • SHA1

    5cc005b34522a1624ff9dcacd3225a67e035ff9d

  • SHA256

    67ab0ca80c2d43d2909fce50445a63747ea98817d52c1e28fb5de3741847d4dc

  • SHA512

    618e5bc4d79b44f4e67c326cf5a555c5e241d302a9322833c4296c6ab051e4ea41abb44912e8aae60aa52ff838745cc8c1c6aeb676f724bcd1d636fdc2b44a22

  • SSDEEP

    3072:Di49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:DH9RVaPEmsdHdbQUbd2H3

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

128.199.200.38:443

192.163.233.216:6601

43.229.206.244:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_67ab0ca80c2d43d2909fce50445a63747ea98817d52c1e28fb5de3741847d4dc

    • Size

      171KB

    • MD5

      7dd8b295f6d1757b7ad0fc4fc0b65b91

    • SHA1

      5cc005b34522a1624ff9dcacd3225a67e035ff9d

    • SHA256

      67ab0ca80c2d43d2909fce50445a63747ea98817d52c1e28fb5de3741847d4dc

    • SHA512

      618e5bc4d79b44f4e67c326cf5a555c5e241d302a9322833c4296c6ab051e4ea41abb44912e8aae60aa52ff838745cc8c1c6aeb676f724bcd1d636fdc2b44a22

    • SSDEEP

      3072:Di49mEb06hs9BPEmmvt7dNbTqub9Un7WpVJBR13LSoAH7Dk0ZT:DH9RVaPEmsdHdbQUbd2H3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks