General

  • Target

    JaffaCakes118_8b053d076ef9c653ec10323585fb590de1732af2de7ebde980f91a248c022d71

  • Size

    177KB

  • Sample

    241230-erezbaxpcy

  • MD5

    e87c5fe0a845652bfc37fdf842ca1e87

  • SHA1

    a35d32ae2263d6c4ab6e0b260f81c39480e53f21

  • SHA256

    8b053d076ef9c653ec10323585fb590de1732af2de7ebde980f91a248c022d71

  • SHA512

    1c782e472beaf189958a167c835a7c690e5d8fe53a387a8f10684d13d5103b0e2dc2e2d99a4a60b9d9f044672bcba74c77ea54a96a07fc96dc37f4bb117a35ca

  • SSDEEP

    3072:juCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:HzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8b053d076ef9c653ec10323585fb590de1732af2de7ebde980f91a248c022d71

    • Size

      177KB

    • MD5

      e87c5fe0a845652bfc37fdf842ca1e87

    • SHA1

      a35d32ae2263d6c4ab6e0b260f81c39480e53f21

    • SHA256

      8b053d076ef9c653ec10323585fb590de1732af2de7ebde980f91a248c022d71

    • SHA512

      1c782e472beaf189958a167c835a7c690e5d8fe53a387a8f10684d13d5103b0e2dc2e2d99a4a60b9d9f044672bcba74c77ea54a96a07fc96dc37f4bb117a35ca

    • SSDEEP

      3072:juCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:HzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks