General

  • Target

    JaffaCakes118_be771901e35d1af14a5771b669ca51a27d6a8fa0e3b71dc5eb01d3116a8c51e5

  • Size

    161KB

  • Sample

    241224-mjs5zavpen

  • MD5

    6d20e879a2f22dfc5cb8cd4c7abf3f13

  • SHA1

    0b670dce89a7465f6f7d970318c278b4c6587aed

  • SHA256

    be771901e35d1af14a5771b669ca51a27d6a8fa0e3b71dc5eb01d3116a8c51e5

  • SHA512

    55596c5224bd11325c2558d6048c0caf12ded5755141b0948c4f4d904e71186f3ecd3b736d970c161dafb068fc3b44086662f31d47452dde46d0026886540462

  • SSDEEP

    3072:8C45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:h4KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_be771901e35d1af14a5771b669ca51a27d6a8fa0e3b71dc5eb01d3116a8c51e5

    • Size

      161KB

    • MD5

      6d20e879a2f22dfc5cb8cd4c7abf3f13

    • SHA1

      0b670dce89a7465f6f7d970318c278b4c6587aed

    • SHA256

      be771901e35d1af14a5771b669ca51a27d6a8fa0e3b71dc5eb01d3116a8c51e5

    • SHA512

      55596c5224bd11325c2558d6048c0caf12ded5755141b0948c4f4d904e71186f3ecd3b736d970c161dafb068fc3b44086662f31d47452dde46d0026886540462

    • SSDEEP

      3072:8C45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:h4KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks