General

  • Target

    JaffaCakes118_0547c8e54e006bbef95abce705dd85d2fe9e9398f853bad5e26e0ac780c59f42

  • Size

    161KB

  • Sample

    241230-ymhzysymez

  • MD5

    c836f02fe8261437044f4565f135dcbb

  • SHA1

    efe970492b9e2a4301db2fb25ef22f5be969c67f

  • SHA256

    0547c8e54e006bbef95abce705dd85d2fe9e9398f853bad5e26e0ac780c59f42

  • SHA512

    5b182a4c4e0ac0f67aebfcbe897ab12249a25d08cdc9b3143bebb133a766b996f4ca2c6515ed6a6afe0398aef8f25c365e060be931679a900ae1c11648690345

  • SSDEEP

    3072:Ad63mpMBf4M8+pwhukvhU7fWaX/77/DZgTmbg+MGaFplA33VBrUYCx3:8a/jkvhSlP/7bg8aFnA3brC

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

193.200.130.181:443

95.138.161.226:2303

167.114.113.13:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0547c8e54e006bbef95abce705dd85d2fe9e9398f853bad5e26e0ac780c59f42

    • Size

      161KB

    • MD5

      c836f02fe8261437044f4565f135dcbb

    • SHA1

      efe970492b9e2a4301db2fb25ef22f5be969c67f

    • SHA256

      0547c8e54e006bbef95abce705dd85d2fe9e9398f853bad5e26e0ac780c59f42

    • SHA512

      5b182a4c4e0ac0f67aebfcbe897ab12249a25d08cdc9b3143bebb133a766b996f4ca2c6515ed6a6afe0398aef8f25c365e060be931679a900ae1c11648690345

    • SSDEEP

      3072:Ad63mpMBf4M8+pwhukvhU7fWaX/77/DZgTmbg+MGaFplA33VBrUYCx3:8a/jkvhSlP/7bg8aFnA3brC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks