General

  • Target

    JaffaCakes118_c874ea0a0bcda9d84c171e410b30be2fc09096e36e35ea8bb8d90f53dacee207

  • Size

    164KB

  • Sample

    241224-lck1catmht

  • MD5

    98cdb9a12f528fe0d26c4ff404678b14

  • SHA1

    1c15f17f3d6d0d0706485347b38889bb25e86081

  • SHA256

    c874ea0a0bcda9d84c171e410b30be2fc09096e36e35ea8bb8d90f53dacee207

  • SHA512

    0c7b957a1406fd6e0bbec8a953ab7a60e8304d40ea75a542f9c5bbab15c55a806641c0590798d967f5df570b5d23b930a7dc2d945b3c68e331b40bded54d94b0

  • SSDEEP

    3072:kBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:kBefiv/12+2A1AIpFzxCtNjHSoPm11J

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.123.40.54:443

82.209.17.209:8172

180.250.21.2:13721

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c874ea0a0bcda9d84c171e410b30be2fc09096e36e35ea8bb8d90f53dacee207

    • Size

      164KB

    • MD5

      98cdb9a12f528fe0d26c4ff404678b14

    • SHA1

      1c15f17f3d6d0d0706485347b38889bb25e86081

    • SHA256

      c874ea0a0bcda9d84c171e410b30be2fc09096e36e35ea8bb8d90f53dacee207

    • SHA512

      0c7b957a1406fd6e0bbec8a953ab7a60e8304d40ea75a542f9c5bbab15c55a806641c0590798d967f5df570b5d23b930a7dc2d945b3c68e331b40bded54d94b0

    • SSDEEP

      3072:kBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:kBefiv/12+2A1AIpFzxCtNjHSoPm11J

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks