General

  • Target

    JaffaCakes118_0d101c3b11a008342000ec1ef1e654c12d1a70e016872942d098c53a3cdf1537

  • Size

    177KB

  • Sample

    241223-1nk7tasmaw

  • MD5

    528dc4979b6b76bb5f870ad267e70a6d

  • SHA1

    1a93fe20ece9450afaf7a0a05751a37412145c30

  • SHA256

    0d101c3b11a008342000ec1ef1e654c12d1a70e016872942d098c53a3cdf1537

  • SHA512

    143f54cc15093d8ca9a9ba94046e5769bb40612bbe2ffed8447309ea77b04eca904d83fdd8914acc0bc636fa11890b8bb5ea3d592e583aef2625e961286ebb7c

  • SSDEEP

    3072:noNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:oaIzLgKrjbvUAjERycp6c8qgATA2TQUr

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0d101c3b11a008342000ec1ef1e654c12d1a70e016872942d098c53a3cdf1537

    • Size

      177KB

    • MD5

      528dc4979b6b76bb5f870ad267e70a6d

    • SHA1

      1a93fe20ece9450afaf7a0a05751a37412145c30

    • SHA256

      0d101c3b11a008342000ec1ef1e654c12d1a70e016872942d098c53a3cdf1537

    • SHA512

      143f54cc15093d8ca9a9ba94046e5769bb40612bbe2ffed8447309ea77b04eca904d83fdd8914acc0bc636fa11890b8bb5ea3d592e583aef2625e961286ebb7c

    • SSDEEP

      3072:noNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:oaIzLgKrjbvUAjERycp6c8qgATA2TQUr

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks