General

  • Target

    JaffaCakes118_58c8d6dd06a3e9f0f8c25952d15b965c04038b8823066f0f801d24612abc0b44

  • Size

    164KB

  • Sample

    241229-2yvdxazkc1

  • MD5

    d4138a7b3e51509b7e9ab0e8224cb86c

  • SHA1

    dbd10c611c3e4417191754de5cf13b5faba56636

  • SHA256

    58c8d6dd06a3e9f0f8c25952d15b965c04038b8823066f0f801d24612abc0b44

  • SHA512

    bb16ae843cbc2a8872ab8584cb4dc9d2db858d4a2019bde621c89e3ed93ebe58bcf5d0d3547b93dc3fffa282deaf9cc7150f49879f061407f487e8c2e681af63

  • SSDEEP

    3072:5BefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:5Befiv/12+2A1AIpFzxCtNjHSoPm11J

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.123.40.54:443

82.209.17.209:8172

180.250.21.2:13721

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_58c8d6dd06a3e9f0f8c25952d15b965c04038b8823066f0f801d24612abc0b44

    • Size

      164KB

    • MD5

      d4138a7b3e51509b7e9ab0e8224cb86c

    • SHA1

      dbd10c611c3e4417191754de5cf13b5faba56636

    • SHA256

      58c8d6dd06a3e9f0f8c25952d15b965c04038b8823066f0f801d24612abc0b44

    • SHA512

      bb16ae843cbc2a8872ab8584cb4dc9d2db858d4a2019bde621c89e3ed93ebe58bcf5d0d3547b93dc3fffa282deaf9cc7150f49879f061407f487e8c2e681af63

    • SSDEEP

      3072:5BefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:5Befiv/12+2A1AIpFzxCtNjHSoPm11J

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks