General

  • Target

    JaffaCakes118_19848da38cc3f1861ee606687b2ae871a7914d1b531f3d4ccf4acba5f64665f8

  • Size

    162KB

  • Sample

    241229-jpwaqswrd1

  • MD5

    55fcd02c70c9e40026b6d0a6e631c3c6

  • SHA1

    080e199a6bffc8d989b9e65b15f5dc77cf9e6852

  • SHA256

    19848da38cc3f1861ee606687b2ae871a7914d1b531f3d4ccf4acba5f64665f8

  • SHA512

    12956bed2a579650dfec99c1c57b41954896d8d1bc0b795947ddc058941bc389065fc9404391243d1056019f114dd6def53a70de55578f0a43badd775c30047d

  • SSDEEP

    3072:Xesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLiV:b4+VZQpt5hyPsa1ekiE9V

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

203.114.109.124:443

82.165.145.100:6601

94.177.255.18:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_19848da38cc3f1861ee606687b2ae871a7914d1b531f3d4ccf4acba5f64665f8

    • Size

      162KB

    • MD5

      55fcd02c70c9e40026b6d0a6e631c3c6

    • SHA1

      080e199a6bffc8d989b9e65b15f5dc77cf9e6852

    • SHA256

      19848da38cc3f1861ee606687b2ae871a7914d1b531f3d4ccf4acba5f64665f8

    • SHA512

      12956bed2a579650dfec99c1c57b41954896d8d1bc0b795947ddc058941bc389065fc9404391243d1056019f114dd6def53a70de55578f0a43badd775c30047d

    • SSDEEP

      3072:Xesl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLiV:b4+VZQpt5hyPsa1ekiE9V

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks