General

  • Target

    JaffaCakes118_fb829b18f9ba76ba3897b43aa6920e42f8df8eac15114700dcd5a80c3a1262b9

  • Size

    177KB

  • Sample

    241230-2brz9svjb1

  • MD5

    8ece9923ec484ae087051a1784a5442a

  • SHA1

    ac4cc1e0fdcd76785df9574bf4b56fe13301ac43

  • SHA256

    fb829b18f9ba76ba3897b43aa6920e42f8df8eac15114700dcd5a80c3a1262b9

  • SHA512

    ab39fc9cb3b29806d8d9afdbb2af3d52e48695996fda18144f637402b82d0ad01bcd701b754fe8513e76ca9e10070623d8e68e55c2df1be005bee65ea1c9edd3

  • SSDEEP

    3072:GuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:6zWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fb829b18f9ba76ba3897b43aa6920e42f8df8eac15114700dcd5a80c3a1262b9

    • Size

      177KB

    • MD5

      8ece9923ec484ae087051a1784a5442a

    • SHA1

      ac4cc1e0fdcd76785df9574bf4b56fe13301ac43

    • SHA256

      fb829b18f9ba76ba3897b43aa6920e42f8df8eac15114700dcd5a80c3a1262b9

    • SHA512

      ab39fc9cb3b29806d8d9afdbb2af3d52e48695996fda18144f637402b82d0ad01bcd701b754fe8513e76ca9e10070623d8e68e55c2df1be005bee65ea1c9edd3

    • SSDEEP

      3072:GuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:6zWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks