General

  • Target

    JaffaCakes118_57ca787b8685ae08b7cc3d8748aaa61da3aeec4bca4c49799433d5ebd67f3737

  • Size

    177KB

  • Sample

    241230-1dsh5ssmgz

  • MD5

    0ad33c8065fb79d626f10247a73ebbde

  • SHA1

    08383551400debed071fc2d840fedc3839c4702d

  • SHA256

    57ca787b8685ae08b7cc3d8748aaa61da3aeec4bca4c49799433d5ebd67f3737

  • SHA512

    f8ffef63b35100bc40b222c150ac51af44417c03adc200474c622f2915ab86941d08583e61d60890531a01844cf3a34a26e8d6bf32bce5ff11d5164c2f1d3edf

  • SSDEEP

    3072:VuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:ZzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_57ca787b8685ae08b7cc3d8748aaa61da3aeec4bca4c49799433d5ebd67f3737

    • Size

      177KB

    • MD5

      0ad33c8065fb79d626f10247a73ebbde

    • SHA1

      08383551400debed071fc2d840fedc3839c4702d

    • SHA256

      57ca787b8685ae08b7cc3d8748aaa61da3aeec4bca4c49799433d5ebd67f3737

    • SHA512

      f8ffef63b35100bc40b222c150ac51af44417c03adc200474c622f2915ab86941d08583e61d60890531a01844cf3a34a26e8d6bf32bce5ff11d5164c2f1d3edf

    • SSDEEP

      3072:VuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:ZzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks