General

  • Target

    JaffaCakes118_de4245b85786615d7f284da32a908b80cb8fbc5d87a96c93013c353041645518

  • Size

    161KB

  • Sample

    241230-vsdqms1jcp

  • MD5

    6982aa81bb27e9b6751d46f24ca463ab

  • SHA1

    4d7dc1b3637e9aea83d6f5054816099c994d8444

  • SHA256

    de4245b85786615d7f284da32a908b80cb8fbc5d87a96c93013c353041645518

  • SHA512

    4f4abbf4103f91c496758d5b38166f04d5904ebece35fcb722e8168b3c8db88c1051aa75a2cf152f8e02f09e51550658785a25cf633c6edf67b18acdc4be6371

  • SSDEEP

    3072:2x45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:A4KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_de4245b85786615d7f284da32a908b80cb8fbc5d87a96c93013c353041645518

    • Size

      161KB

    • MD5

      6982aa81bb27e9b6751d46f24ca463ab

    • SHA1

      4d7dc1b3637e9aea83d6f5054816099c994d8444

    • SHA256

      de4245b85786615d7f284da32a908b80cb8fbc5d87a96c93013c353041645518

    • SHA512

      4f4abbf4103f91c496758d5b38166f04d5904ebece35fcb722e8168b3c8db88c1051aa75a2cf152f8e02f09e51550658785a25cf633c6edf67b18acdc4be6371

    • SSDEEP

      3072:2x45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:A4KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks