General

  • Target

    JaffaCakes118_91e4b5218d0daccf56c9b9b49d35f575c85cf31fd7887a5c28e7f3f6aded849f

  • Size

    161KB

  • Sample

    241230-vtv2ba1jgp

  • MD5

    1b3db416e92a2efa78379badc6cee356

  • SHA1

    3b0092c94d2047484d0eb808c2e69a0fa7e03b99

  • SHA256

    91e4b5218d0daccf56c9b9b49d35f575c85cf31fd7887a5c28e7f3f6aded849f

  • SHA512

    f2440db9e3374822705acd0e4238c86cfddea1d9bd7a869fe9023fe73d1076dad73cbbde99a520f2e1a2127481e8a6fb7bb7627b61c3e1dbc647a050540fdefc

  • SSDEEP

    3072:4m4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:CDBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_91e4b5218d0daccf56c9b9b49d35f575c85cf31fd7887a5c28e7f3f6aded849f

    • Size

      161KB

    • MD5

      1b3db416e92a2efa78379badc6cee356

    • SHA1

      3b0092c94d2047484d0eb808c2e69a0fa7e03b99

    • SHA256

      91e4b5218d0daccf56c9b9b49d35f575c85cf31fd7887a5c28e7f3f6aded849f

    • SHA512

      f2440db9e3374822705acd0e4238c86cfddea1d9bd7a869fe9023fe73d1076dad73cbbde99a520f2e1a2127481e8a6fb7bb7627b61c3e1dbc647a050540fdefc

    • SSDEEP

      3072:4m4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:CDBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks