General

  • Target

    JaffaCakes118_59423829d4bbbe0825500372dbd009a85efd970fa830f9e7a7a76613ea94d1c7

  • Size

    177KB

  • Sample

    241224-dp7e4s1kcr

  • MD5

    fc4047813da9c5c4b3408c1a15b8673b

  • SHA1

    6968ac4f021087d4ee1f2178256b8a9cb12548c6

  • SHA256

    59423829d4bbbe0825500372dbd009a85efd970fa830f9e7a7a76613ea94d1c7

  • SHA512

    d8f2515c63b081871c06e75eeb5bfdca2a6bd919cf040661654d8e756a78fda02e3ca53681d1a29660dcdb60c52b426acc3fd859d8067e35dfd866965acf5e44

  • SSDEEP

    3072:euCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:yzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_59423829d4bbbe0825500372dbd009a85efd970fa830f9e7a7a76613ea94d1c7

    • Size

      177KB

    • MD5

      fc4047813da9c5c4b3408c1a15b8673b

    • SHA1

      6968ac4f021087d4ee1f2178256b8a9cb12548c6

    • SHA256

      59423829d4bbbe0825500372dbd009a85efd970fa830f9e7a7a76613ea94d1c7

    • SHA512

      d8f2515c63b081871c06e75eeb5bfdca2a6bd919cf040661654d8e756a78fda02e3ca53681d1a29660dcdb60c52b426acc3fd859d8067e35dfd866965acf5e44

    • SSDEEP

      3072:euCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:yzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks