General

  • Target

    JaffaCakes118_7ca3fa6b9148b73339f8d77bb0afa405e5373814b817b79f537a594473c71a54

  • Size

    161KB

  • Sample

    241230-yyndtazjft

  • MD5

    5d5ddb4148263f829e6ea3bb44dccae0

  • SHA1

    1b0912aea663ad3d4376bee55435006148c1adb9

  • SHA256

    7ca3fa6b9148b73339f8d77bb0afa405e5373814b817b79f537a594473c71a54

  • SHA512

    6cd613eac1e29a01222ca1c1b96db94376c90be82fc0cbc743ac872d66f2f4a35404dd73c4f6e544c4df9a6c39117ca712e726cd9649cbdc9a340abb35706922

  • SSDEEP

    3072:WC45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:X4KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7ca3fa6b9148b73339f8d77bb0afa405e5373814b817b79f537a594473c71a54

    • Size

      161KB

    • MD5

      5d5ddb4148263f829e6ea3bb44dccae0

    • SHA1

      1b0912aea663ad3d4376bee55435006148c1adb9

    • SHA256

      7ca3fa6b9148b73339f8d77bb0afa405e5373814b817b79f537a594473c71a54

    • SHA512

      6cd613eac1e29a01222ca1c1b96db94376c90be82fc0cbc743ac872d66f2f4a35404dd73c4f6e544c4df9a6c39117ca712e726cd9649cbdc9a340abb35706922

    • SSDEEP

      3072:WC45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:X4KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks