General

  • Target

    JaffaCakes118_7e96bf46eabad877e8477bb3afcc4162d8d464b89ee919e2e1dfc5a805820fa8

  • Size

    161KB

  • Sample

    241225-fbgcwaylfn

  • MD5

    e7d141fb169a67cd5921c438451e0cb3

  • SHA1

    8f179171e887957f5ceb9c713cee719d2a0fa772

  • SHA256

    7e96bf46eabad877e8477bb3afcc4162d8d464b89ee919e2e1dfc5a805820fa8

  • SHA512

    4a0893847cfaf061254d78d468b0db147a8e8177befd8e82fae2bf1a0d9f96d9df220ef92b5060df48f799ed5f08a3b4a6cdadd6393b4016616e27734495dbbb

  • SSDEEP

    3072:Sf4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:1DBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7e96bf46eabad877e8477bb3afcc4162d8d464b89ee919e2e1dfc5a805820fa8

    • Size

      161KB

    • MD5

      e7d141fb169a67cd5921c438451e0cb3

    • SHA1

      8f179171e887957f5ceb9c713cee719d2a0fa772

    • SHA256

      7e96bf46eabad877e8477bb3afcc4162d8d464b89ee919e2e1dfc5a805820fa8

    • SHA512

      4a0893847cfaf061254d78d468b0db147a8e8177befd8e82fae2bf1a0d9f96d9df220ef92b5060df48f799ed5f08a3b4a6cdadd6393b4016616e27734495dbbb

    • SSDEEP

      3072:Sf4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:1DBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks