General

  • Target

    JaffaCakes118_1ee931c746a5f712645c5dee20f7bff9660e154f3c3fa20f548ac235a5806de7

  • Size

    164KB

  • Sample

    241226-thnmeszlds

  • MD5

    65333637ff6b4b715a488838dffa784e

  • SHA1

    1101f28e89c65cb3a4cacf0bc8765d89571c794e

  • SHA256

    1ee931c746a5f712645c5dee20f7bff9660e154f3c3fa20f548ac235a5806de7

  • SHA512

    a15d1515d6c40fcda7e5071d522b64469f6775f1489013535cead8c5ceb1df67641cba854879b125e4b1b16c09854b131f9eb95193e24e96fbc42eeeecc26cd6

  • SSDEEP

    3072:fBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:fBefiv/12+2A1AIpFzxCtNjHSoPm11J

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.123.40.54:443

82.209.17.209:8172

180.250.21.2:13721

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1ee931c746a5f712645c5dee20f7bff9660e154f3c3fa20f548ac235a5806de7

    • Size

      164KB

    • MD5

      65333637ff6b4b715a488838dffa784e

    • SHA1

      1101f28e89c65cb3a4cacf0bc8765d89571c794e

    • SHA256

      1ee931c746a5f712645c5dee20f7bff9660e154f3c3fa20f548ac235a5806de7

    • SHA512

      a15d1515d6c40fcda7e5071d522b64469f6775f1489013535cead8c5ceb1df67641cba854879b125e4b1b16c09854b131f9eb95193e24e96fbc42eeeecc26cd6

    • SSDEEP

      3072:fBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:fBefiv/12+2A1AIpFzxCtNjHSoPm11J

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks