General

  • Target

    JaffaCakes118_0c32ee37c9f30463573d09a6f644a49ff66c28b289fa0fccdadb1eee59e60936

  • Size

    177KB

  • Sample

    241223-xydc6sykbn

  • MD5

    93166ed3ebed69579e993714edf8aff3

  • SHA1

    feca085abde3e64f71476112ab1f585ef710364d

  • SHA256

    0c32ee37c9f30463573d09a6f644a49ff66c28b289fa0fccdadb1eee59e60936

  • SHA512

    33deab83b3f51166525335e2b853ac3408a78262ecbb2f85ad621940de90f9a97930eaf264cd76ecc4c39c3d6a9f57a4d51810945f83536574995d2a276ad37f

  • SSDEEP

    3072:NuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:RzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0c32ee37c9f30463573d09a6f644a49ff66c28b289fa0fccdadb1eee59e60936

    • Size

      177KB

    • MD5

      93166ed3ebed69579e993714edf8aff3

    • SHA1

      feca085abde3e64f71476112ab1f585ef710364d

    • SHA256

      0c32ee37c9f30463573d09a6f644a49ff66c28b289fa0fccdadb1eee59e60936

    • SHA512

      33deab83b3f51166525335e2b853ac3408a78262ecbb2f85ad621940de90f9a97930eaf264cd76ecc4c39c3d6a9f57a4d51810945f83536574995d2a276ad37f

    • SSDEEP

      3072:NuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:RzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks