General

  • Target

    JaffaCakes118_6efdbf6264e68fe89ed8b023173da2b85a49eb8a29684b224d3cd5229d2eb282

  • Size

    161KB

  • Sample

    241225-r7zpwawkck

  • MD5

    b3d4d58a9a8bfd02567b1fa961f3c7d7

  • SHA1

    b990a59cb69268127bb195796af4c06fd7a886ab

  • SHA256

    6efdbf6264e68fe89ed8b023173da2b85a49eb8a29684b224d3cd5229d2eb282

  • SHA512

    faf230596b7dc7068c55192d9944d7fb785151aef003ac60b1c4282a7c0dd79377b3e0aefe89a4cb795785ba3438e9a2410a2a24afa1dd83b69ec13a4823e869

  • SSDEEP

    3072:ec4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:+DBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6efdbf6264e68fe89ed8b023173da2b85a49eb8a29684b224d3cd5229d2eb282

    • Size

      161KB

    • MD5

      b3d4d58a9a8bfd02567b1fa961f3c7d7

    • SHA1

      b990a59cb69268127bb195796af4c06fd7a886ab

    • SHA256

      6efdbf6264e68fe89ed8b023173da2b85a49eb8a29684b224d3cd5229d2eb282

    • SHA512

      faf230596b7dc7068c55192d9944d7fb785151aef003ac60b1c4282a7c0dd79377b3e0aefe89a4cb795785ba3438e9a2410a2a24afa1dd83b69ec13a4823e869

    • SSDEEP

      3072:ec4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:+DBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks