General

  • Target

    JaffaCakes118_1b8f90656f025c7a52906e7430f3bf82fae94c948557cd31fb9f005ef0f32138

  • Size

    166KB

  • Sample

    241225-pls9vssqfp

  • MD5

    c500fae6cab488355652d14b70cfa9cc

  • SHA1

    aab52609756577f571a77f05fd157fe91139c8da

  • SHA256

    1b8f90656f025c7a52906e7430f3bf82fae94c948557cd31fb9f005ef0f32138

  • SHA512

    c536e261cad79d87cbccd091eb24e995d58b92fe61d7eeb6cd5e7d33fbf2ae85f57dbd8047e132e27a6cea9674ff0c5dbe6e6998f5872183a80886c8abf00f09

  • SSDEEP

    3072:muFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+qa:m0czbty9uiaJlva

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

131.100.24.202:443

193.160.214.95:4125

67.43.4.76:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1b8f90656f025c7a52906e7430f3bf82fae94c948557cd31fb9f005ef0f32138

    • Size

      166KB

    • MD5

      c500fae6cab488355652d14b70cfa9cc

    • SHA1

      aab52609756577f571a77f05fd157fe91139c8da

    • SHA256

      1b8f90656f025c7a52906e7430f3bf82fae94c948557cd31fb9f005ef0f32138

    • SHA512

      c536e261cad79d87cbccd091eb24e995d58b92fe61d7eeb6cd5e7d33fbf2ae85f57dbd8047e132e27a6cea9674ff0c5dbe6e6998f5872183a80886c8abf00f09

    • SSDEEP

      3072:muFbQtsYQcjxanytIp92/l1iPPqs1/whG68DaHrnpDZ+qa:m0czbty9uiaJlva

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks