General

  • Target

    JaffaCakes118_97cbee74ce0792d1f2017bb930e3c6c692af9e74a65d51b3c14451bff77b7c0c

  • Size

    161KB

  • Sample

    241230-z2t67s1rcy

  • MD5

    1b23b0e1d962003eb45c91115bff793b

  • SHA1

    cf45e6ac1ef6303f4d93a7b35278890743f1d664

  • SHA256

    97cbee74ce0792d1f2017bb930e3c6c692af9e74a65d51b3c14451bff77b7c0c

  • SHA512

    1cd0d6c06432be7d0cd62e79d057a28b21ebe732647b701f8f642bc1a34bcad09915a556a0a86f517c373a0d953833297038c67978afc6545a22c7d6fa89f3d7

  • SSDEEP

    3072:Qi45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:94KcMhVkbK3hDq9E8i

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_97cbee74ce0792d1f2017bb930e3c6c692af9e74a65d51b3c14451bff77b7c0c

    • Size

      161KB

    • MD5

      1b23b0e1d962003eb45c91115bff793b

    • SHA1

      cf45e6ac1ef6303f4d93a7b35278890743f1d664

    • SHA256

      97cbee74ce0792d1f2017bb930e3c6c692af9e74a65d51b3c14451bff77b7c0c

    • SHA512

      1cd0d6c06432be7d0cd62e79d057a28b21ebe732647b701f8f642bc1a34bcad09915a556a0a86f517c373a0d953833297038c67978afc6545a22c7d6fa89f3d7

    • SSDEEP

      3072:Qi45bscWrhftr4SOX63M5jY17lh9sDVj9a/KBz9YlYU:94KcMhVkbK3hDq9E8i

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks