General

  • Target

    JaffaCakes118_e6e9fc2686ebcb19b0b89eb9f578af86e8fc0b1981a05f9c3a678788054ed5f9

  • Size

    177KB

  • Sample

    241230-1ncwfazpdk

  • MD5

    c84f256c5f1bfa0d0f9752ac2ecee9f0

  • SHA1

    70e8cd289471fa9c6ca117684f6f4741d5cd39fe

  • SHA256

    e6e9fc2686ebcb19b0b89eb9f578af86e8fc0b1981a05f9c3a678788054ed5f9

  • SHA512

    c33bde14492d769df0a7c9f0a0867bd5fd49f46c41f05223a4c52dfe3ab0b2f793bb8d81c018b2dd83dadc132489a4c1cb0e64416ea6294e71cea5a175e38adb

  • SSDEEP

    3072:foNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:QaIzLgKrjbvUAjERycp6c8qgATA2TQUr

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e6e9fc2686ebcb19b0b89eb9f578af86e8fc0b1981a05f9c3a678788054ed5f9

    • Size

      177KB

    • MD5

      c84f256c5f1bfa0d0f9752ac2ecee9f0

    • SHA1

      70e8cd289471fa9c6ca117684f6f4741d5cd39fe

    • SHA256

      e6e9fc2686ebcb19b0b89eb9f578af86e8fc0b1981a05f9c3a678788054ed5f9

    • SHA512

      c33bde14492d769df0a7c9f0a0867bd5fd49f46c41f05223a4c52dfe3ab0b2f793bb8d81c018b2dd83dadc132489a4c1cb0e64416ea6294e71cea5a175e38adb

    • SSDEEP

      3072:foNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:QaIzLgKrjbvUAjERycp6c8qgATA2TQUr

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks