General

  • Target

    JaffaCakes118_2767711d0aea75d3d26c32a337c715c2cdddb9e67e46a530d0cfdf85bcc8d5fc

  • Size

    177KB

  • Sample

    241224-cd3gcaylev

  • MD5

    8606ef5ac1aa6cb581a42f0f6424eb3f

  • SHA1

    440fb19fabd5ae88d1a67f101c84859603c0cb77

  • SHA256

    2767711d0aea75d3d26c32a337c715c2cdddb9e67e46a530d0cfdf85bcc8d5fc

  • SHA512

    3f44a4b66716d7381b1c927ab189d4d923150e99c3c4107ca42c3dd2ee5f08a1b5554ae903e859389926684162aa9c8182fba03c0df5a750e5643fd9a55d52d6

  • SSDEEP

    3072:uuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:CzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2767711d0aea75d3d26c32a337c715c2cdddb9e67e46a530d0cfdf85bcc8d5fc

    • Size

      177KB

    • MD5

      8606ef5ac1aa6cb581a42f0f6424eb3f

    • SHA1

      440fb19fabd5ae88d1a67f101c84859603c0cb77

    • SHA256

      2767711d0aea75d3d26c32a337c715c2cdddb9e67e46a530d0cfdf85bcc8d5fc

    • SHA512

      3f44a4b66716d7381b1c927ab189d4d923150e99c3c4107ca42c3dd2ee5f08a1b5554ae903e859389926684162aa9c8182fba03c0df5a750e5643fd9a55d52d6

    • SSDEEP

      3072:uuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:CzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks