General

  • Target

    JaffaCakes118_08ec85921ea9af354cc12765078c5edcbeb86e7cde03862d0837366127edefd0

  • Size

    177KB

  • Sample

    241223-xwferayjeq

  • MD5

    f6df3d56b3c0c4c8e4a60298f6788a59

  • SHA1

    143a50f8950f04341b6b9750ff2ce6b451ac8278

  • SHA256

    08ec85921ea9af354cc12765078c5edcbeb86e7cde03862d0837366127edefd0

  • SHA512

    41abd44772fe4c1beaf9699421340618f6ae9c7322372f6d4c8db7f4602860dab0b378349f7b73b0be1e6a8c9127eb4a998a91d4039a053e4ce2b72503622603

  • SSDEEP

    3072:EuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:YzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_08ec85921ea9af354cc12765078c5edcbeb86e7cde03862d0837366127edefd0

    • Size

      177KB

    • MD5

      f6df3d56b3c0c4c8e4a60298f6788a59

    • SHA1

      143a50f8950f04341b6b9750ff2ce6b451ac8278

    • SHA256

      08ec85921ea9af354cc12765078c5edcbeb86e7cde03862d0837366127edefd0

    • SHA512

      41abd44772fe4c1beaf9699421340618f6ae9c7322372f6d4c8db7f4602860dab0b378349f7b73b0be1e6a8c9127eb4a998a91d4039a053e4ce2b72503622603

    • SSDEEP

      3072:EuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:YzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks