General

  • Target

    JaffaCakes118_1724abd452c0dea6645449d57c171865c53ffd5934eca8ab0709224c047c6611

  • Size

    177KB

  • Sample

    241230-2tzstssnek

  • MD5

    30fd53e663cb7ab7c9790ed92b2e74a7

  • SHA1

    e82b83055854725eadab471ba9ba022aca6f7d9c

  • SHA256

    1724abd452c0dea6645449d57c171865c53ffd5934eca8ab0709224c047c6611

  • SHA512

    3ad153f2d522362146c09c008c30637080056bc0199e638e65a91740bbfb5438b1d9b03ce2cba95673c76d7249611e6a41e98a38bc21c13689ea5dc26df57a45

  • SSDEEP

    3072:luCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:pzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1724abd452c0dea6645449d57c171865c53ffd5934eca8ab0709224c047c6611

    • Size

      177KB

    • MD5

      30fd53e663cb7ab7c9790ed92b2e74a7

    • SHA1

      e82b83055854725eadab471ba9ba022aca6f7d9c

    • SHA256

      1724abd452c0dea6645449d57c171865c53ffd5934eca8ab0709224c047c6611

    • SHA512

      3ad153f2d522362146c09c008c30637080056bc0199e638e65a91740bbfb5438b1d9b03ce2cba95673c76d7249611e6a41e98a38bc21c13689ea5dc26df57a45

    • SSDEEP

      3072:luCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:pzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks