General

  • Target

    JaffaCakes118_db8df4ff85e7864e0cba806def55ba2a6d29d47ceafcd0f19ceccb035d22471e

  • Size

    177KB

  • Sample

    241223-y6djksznfx

  • MD5

    fc2dd3af4eec649399687768afaa0fd7

  • SHA1

    6f6b90c3bd4239e58aae269e7389e364ba7d9f49

  • SHA256

    db8df4ff85e7864e0cba806def55ba2a6d29d47ceafcd0f19ceccb035d22471e

  • SHA512

    30cd9ce5b9586bcfb6135ef79651f4120713380e09c37c207dd655cba753b73a46ed30e36a7fca24ac5f556a0aa3ea68fb6b3f03a5a9723a72e24afc2d9454ae

  • SSDEEP

    3072:YoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:baIzLgKrjbvUAjERycp6c8qgATA2TQUr

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_db8df4ff85e7864e0cba806def55ba2a6d29d47ceafcd0f19ceccb035d22471e

    • Size

      177KB

    • MD5

      fc2dd3af4eec649399687768afaa0fd7

    • SHA1

      6f6b90c3bd4239e58aae269e7389e364ba7d9f49

    • SHA256

      db8df4ff85e7864e0cba806def55ba2a6d29d47ceafcd0f19ceccb035d22471e

    • SHA512

      30cd9ce5b9586bcfb6135ef79651f4120713380e09c37c207dd655cba753b73a46ed30e36a7fca24ac5f556a0aa3ea68fb6b3f03a5a9723a72e24afc2d9454ae

    • SSDEEP

      3072:YoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:baIzLgKrjbvUAjERycp6c8qgATA2TQUr

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks