General

  • Target

    JaffaCakes118_f5d6ff41b718af4163c93d842f1b8142b016e9b9979d1f6c092b10180c46e07d

  • Size

    161KB

  • Sample

    241225-c9gvhsvrdk

  • MD5

    5d727bee811d9e3d81cd8662df2c8373

  • SHA1

    7a15f0f27f915906a5718fa0ebb9bd21ccb6dbf6

  • SHA256

    f5d6ff41b718af4163c93d842f1b8142b016e9b9979d1f6c092b10180c46e07d

  • SHA512

    9e98580018aa473775588356cc558dcf18822a6f7bf5a1f33040933718a9c0b1313fcb98c155694ba12e60812cc55a9935ce9e6f90b739bc04b97e60566a92ff

  • SSDEEP

    3072:jpJZRGSBBcRAhzHoCUP14kVH0x4CDcz8RKGR4VfG7Gekj00JXtN9Xm5nA:dJZUSBaRARoCgdH0xtXKGRv7GekP9a5n

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

193.200.130.181:443

95.138.161.226:2303

167.114.113.13:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f5d6ff41b718af4163c93d842f1b8142b016e9b9979d1f6c092b10180c46e07d

    • Size

      161KB

    • MD5

      5d727bee811d9e3d81cd8662df2c8373

    • SHA1

      7a15f0f27f915906a5718fa0ebb9bd21ccb6dbf6

    • SHA256

      f5d6ff41b718af4163c93d842f1b8142b016e9b9979d1f6c092b10180c46e07d

    • SHA512

      9e98580018aa473775588356cc558dcf18822a6f7bf5a1f33040933718a9c0b1313fcb98c155694ba12e60812cc55a9935ce9e6f90b739bc04b97e60566a92ff

    • SSDEEP

      3072:jpJZRGSBBcRAhzHoCUP14kVH0x4CDcz8RKGR4VfG7Gekj00JXtN9Xm5nA:dJZUSBaRARoCgdH0xtXKGRv7GekP9a5n

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks