General

  • Target

    JaffaCakes118_0f19bff3d49d6a7dab25d7db391c7d68e29a05f274f336e29aaf9430245020c2

  • Size

    177KB

  • Sample

    241223-169ywstjds

  • MD5

    76a266c1867cfe6a87f4c0ca4b2be2d9

  • SHA1

    4a6b1970e4c9d646da6b8103aa861e8578953cdf

  • SHA256

    0f19bff3d49d6a7dab25d7db391c7d68e29a05f274f336e29aaf9430245020c2

  • SHA512

    82c7006295bd77f6db0c9ba6bb358a5c420518259ee410386d999351ffa53776c7b05dd9abe62da4b4ef5f70dcfae412431857f99b67150081308745209be0e2

  • SSDEEP

    3072:JoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:aaIzLgKrjbvUAjERycp6c8qgATA2TQUr

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0f19bff3d49d6a7dab25d7db391c7d68e29a05f274f336e29aaf9430245020c2

    • Size

      177KB

    • MD5

      76a266c1867cfe6a87f4c0ca4b2be2d9

    • SHA1

      4a6b1970e4c9d646da6b8103aa861e8578953cdf

    • SHA256

      0f19bff3d49d6a7dab25d7db391c7d68e29a05f274f336e29aaf9430245020c2

    • SHA512

      82c7006295bd77f6db0c9ba6bb358a5c420518259ee410386d999351ffa53776c7b05dd9abe62da4b4ef5f70dcfae412431857f99b67150081308745209be0e2

    • SSDEEP

      3072:JoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:aaIzLgKrjbvUAjERycp6c8qgATA2TQUr

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks