General

  • Target

    JaffaCakes118_15e3f60912bb2e51336716efa13a51c11f031ba4c4f8c2218ec79dd0e409528d

  • Size

    177KB

  • Sample

    241224-mp6y1svqfj

  • MD5

    8f68c7d736506ac8fd632a2ac8cdbedd

  • SHA1

    a17ac483c1c1b6eec18b3712ef2c01ca36e36dbc

  • SHA256

    15e3f60912bb2e51336716efa13a51c11f031ba4c4f8c2218ec79dd0e409528d

  • SHA512

    0719d45670125032d7dbd8c941e6fb0e5182271efb75062e7820ce612f3e3261284fff84d27e54b57e476018f3fb772636f5321121e9144a4556cc8d22c085b2

  • SSDEEP

    3072:tuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:xzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_15e3f60912bb2e51336716efa13a51c11f031ba4c4f8c2218ec79dd0e409528d

    • Size

      177KB

    • MD5

      8f68c7d736506ac8fd632a2ac8cdbedd

    • SHA1

      a17ac483c1c1b6eec18b3712ef2c01ca36e36dbc

    • SHA256

      15e3f60912bb2e51336716efa13a51c11f031ba4c4f8c2218ec79dd0e409528d

    • SHA512

      0719d45670125032d7dbd8c941e6fb0e5182271efb75062e7820ce612f3e3261284fff84d27e54b57e476018f3fb772636f5321121e9144a4556cc8d22c085b2

    • SSDEEP

      3072:tuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:xzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks