General

  • Target

    JaffaCakes118_503fa2ce1c0e2813fedebda2d37634505db4c9a7fff8f143abefa7e1ae72dc11

  • Size

    161KB

  • Sample

    241229-m8tg2azngy

  • MD5

    ecfdd53675a2b68495d469bee0251beb

  • SHA1

    84af51c5a54daedf9f5d1daff39fb6d02153149b

  • SHA256

    503fa2ce1c0e2813fedebda2d37634505db4c9a7fff8f143abefa7e1ae72dc11

  • SHA512

    07e611073a741941bfa24d08cdc69c87fa369be4e4023e79acdb6eaf0a0ed09c0fd58e40c07e1d227aafdd32201f253972774a7c8e1f862269c9fe7ff9b2070d

  • SSDEEP

    3072:Xm4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:VDBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_503fa2ce1c0e2813fedebda2d37634505db4c9a7fff8f143abefa7e1ae72dc11

    • Size

      161KB

    • MD5

      ecfdd53675a2b68495d469bee0251beb

    • SHA1

      84af51c5a54daedf9f5d1daff39fb6d02153149b

    • SHA256

      503fa2ce1c0e2813fedebda2d37634505db4c9a7fff8f143abefa7e1ae72dc11

    • SHA512

      07e611073a741941bfa24d08cdc69c87fa369be4e4023e79acdb6eaf0a0ed09c0fd58e40c07e1d227aafdd32201f253972774a7c8e1f862269c9fe7ff9b2070d

    • SSDEEP

      3072:Xm4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:VDBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks