General

  • Target

    JaffaCakes118_d6dee1fb894bf9faae8bdcd8157c04ebc4c6999ce0f13fc3c03427a5757e84f5

  • Size

    164KB

  • Sample

    241225-zd4ezawqby

  • MD5

    4de9c5816c01dc6b298a2a67876d8017

  • SHA1

    1559f261cf20ceaa80aa743aea089671c615996f

  • SHA256

    d6dee1fb894bf9faae8bdcd8157c04ebc4c6999ce0f13fc3c03427a5757e84f5

  • SHA512

    cce8fe4a6d622351114f89b41cd0edda46f4144a47794f9f83088eeff58bdb93cc50634cfcfe6024ab8fd7bcd6d7fdc32a284be555b875f1bba7a7e831bb382e

  • SSDEEP

    3072:lBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:lBefiv/12+2A1AIpFzxCtNjHSoPm11J

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.123.40.54:443

82.209.17.209:8172

180.250.21.2:13721

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d6dee1fb894bf9faae8bdcd8157c04ebc4c6999ce0f13fc3c03427a5757e84f5

    • Size

      164KB

    • MD5

      4de9c5816c01dc6b298a2a67876d8017

    • SHA1

      1559f261cf20ceaa80aa743aea089671c615996f

    • SHA256

      d6dee1fb894bf9faae8bdcd8157c04ebc4c6999ce0f13fc3c03427a5757e84f5

    • SHA512

      cce8fe4a6d622351114f89b41cd0edda46f4144a47794f9f83088eeff58bdb93cc50634cfcfe6024ab8fd7bcd6d7fdc32a284be555b875f1bba7a7e831bb382e

    • SSDEEP

      3072:lBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:lBefiv/12+2A1AIpFzxCtNjHSoPm11J

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks