General

  • Target

    JaffaCakes118_71cd52f379e1d92f827c78ce191942ae1c0cb34ec1d6c687c4d3964e6375577f

  • Size

    177KB

  • Sample

    241223-2c6j2stlax

  • MD5

    b948acdfc88da97d9c586d3206226361

  • SHA1

    87c0bbbace9b0ae9599676b7605bf003db0f0999

  • SHA256

    71cd52f379e1d92f827c78ce191942ae1c0cb34ec1d6c687c4d3964e6375577f

  • SHA512

    b0e3ad6e8243243cfee7031ecdfe634586a670221b2bbaa8ff582a3fc2ea9645bb2026ca3cdd7fe463382bc26cf51c93c84048f4427960c77d7f383b785471de

  • SSDEEP

    3072:PuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:LzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_71cd52f379e1d92f827c78ce191942ae1c0cb34ec1d6c687c4d3964e6375577f

    • Size

      177KB

    • MD5

      b948acdfc88da97d9c586d3206226361

    • SHA1

      87c0bbbace9b0ae9599676b7605bf003db0f0999

    • SHA256

      71cd52f379e1d92f827c78ce191942ae1c0cb34ec1d6c687c4d3964e6375577f

    • SHA512

      b0e3ad6e8243243cfee7031ecdfe634586a670221b2bbaa8ff582a3fc2ea9645bb2026ca3cdd7fe463382bc26cf51c93c84048f4427960c77d7f383b785471de

    • SSDEEP

      3072:PuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:LzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks