General

  • Target

    JaffaCakes118_22486a3b225762b1ff5e26801383dea6f5b9b0976a1d22c64a859664c522a921

  • Size

    177KB

  • Sample

    241223-3ccseavlbz

  • MD5

    1fb193cd0929d74c9fe6795146629df9

  • SHA1

    947573a4ee5f381462250eac0c3386e7de6a87de

  • SHA256

    22486a3b225762b1ff5e26801383dea6f5b9b0976a1d22c64a859664c522a921

  • SHA512

    812b262b0946eaa5024297aa2a26222371237fb765fc822dbdeb4e89f5eafb55f61a1717405715d54f37115b0ac430de39641b9931278750d58b6c4f52bdf01d

  • SSDEEP

    3072:EuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:YzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_22486a3b225762b1ff5e26801383dea6f5b9b0976a1d22c64a859664c522a921

    • Size

      177KB

    • MD5

      1fb193cd0929d74c9fe6795146629df9

    • SHA1

      947573a4ee5f381462250eac0c3386e7de6a87de

    • SHA256

      22486a3b225762b1ff5e26801383dea6f5b9b0976a1d22c64a859664c522a921

    • SHA512

      812b262b0946eaa5024297aa2a26222371237fb765fc822dbdeb4e89f5eafb55f61a1717405715d54f37115b0ac430de39641b9931278750d58b6c4f52bdf01d

    • SSDEEP

      3072:EuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:YzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks