General

  • Target

    JaffaCakes118_ff83c6dfddb1cd0dc56e4eb2a8eebf38a6654b9bcf42b87065623130cff2ad61

  • Size

    177KB

  • Sample

    241223-vf4fjavraj

  • MD5

    e0af91f04011c972e1affe414d5abe60

  • SHA1

    e8fa9834c0078498df4b5126a0c9af58ea49ba11

  • SHA256

    ff83c6dfddb1cd0dc56e4eb2a8eebf38a6654b9bcf42b87065623130cff2ad61

  • SHA512

    855d259d38fdcf740c85b286bc75be2687972f323734af956916070d034995d278947d0d4e62e75ff08bf163021e109ec245d099f523a084dad2bc6c2aae4b7e

  • SSDEEP

    3072:ruCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:PzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ff83c6dfddb1cd0dc56e4eb2a8eebf38a6654b9bcf42b87065623130cff2ad61

    • Size

      177KB

    • MD5

      e0af91f04011c972e1affe414d5abe60

    • SHA1

      e8fa9834c0078498df4b5126a0c9af58ea49ba11

    • SHA256

      ff83c6dfddb1cd0dc56e4eb2a8eebf38a6654b9bcf42b87065623130cff2ad61

    • SHA512

      855d259d38fdcf740c85b286bc75be2687972f323734af956916070d034995d278947d0d4e62e75ff08bf163021e109ec245d099f523a084dad2bc6c2aae4b7e

    • SSDEEP

      3072:ruCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:PzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks