General

  • Target

    JaffaCakes118_f54740d10b0e4649be86865abf40971bc22b8dcd2ad43499ffb11fb6fbb4d954

  • Size

    161KB

  • Sample

    241227-ck5kaayrap

  • MD5

    62df2fd5d18bea8ab29c6ee09cec8437

  • SHA1

    ec999ee0a757f520c7fe0188e8ee8b91046edfb4

  • SHA256

    f54740d10b0e4649be86865abf40971bc22b8dcd2ad43499ffb11fb6fbb4d954

  • SHA512

    e8729c05d2ad859dcfd7fa867b1cdbe39b955a3e4c7f4c9570789d6cecb2acdd0e26713a7acbd09a8d98597f563b9a865914d44e369f3415c7462c8eb3e360e6

  • SSDEEP

    3072:2d4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:PDBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f54740d10b0e4649be86865abf40971bc22b8dcd2ad43499ffb11fb6fbb4d954

    • Size

      161KB

    • MD5

      62df2fd5d18bea8ab29c6ee09cec8437

    • SHA1

      ec999ee0a757f520c7fe0188e8ee8b91046edfb4

    • SHA256

      f54740d10b0e4649be86865abf40971bc22b8dcd2ad43499ffb11fb6fbb4d954

    • SHA512

      e8729c05d2ad859dcfd7fa867b1cdbe39b955a3e4c7f4c9570789d6cecb2acdd0e26713a7acbd09a8d98597f563b9a865914d44e369f3415c7462c8eb3e360e6

    • SSDEEP

      3072:2d4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:PDBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks