General

  • Target

    JaffaCakes118_f94a84649c33545fe4497254e21de3a3ef206c4873a38fa94372dc8f30b25ed8

  • Size

    177KB

  • Sample

    241230-fb7j3aylct

  • MD5

    4b928759eeb744fbfeb0ac0c998e8f6a

  • SHA1

    53cab7545e401272528bd0bbdc318274b824ad22

  • SHA256

    f94a84649c33545fe4497254e21de3a3ef206c4873a38fa94372dc8f30b25ed8

  • SHA512

    ee3d5cee848f3509a1e71344b7deb28e06f1a185254cb433c155f8db85420c92537b516d0478429e28f3542b0fa82038779c3744c5c5a45b19a0fe6a61ba7704

  • SSDEEP

    3072:luCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:pzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f94a84649c33545fe4497254e21de3a3ef206c4873a38fa94372dc8f30b25ed8

    • Size

      177KB

    • MD5

      4b928759eeb744fbfeb0ac0c998e8f6a

    • SHA1

      53cab7545e401272528bd0bbdc318274b824ad22

    • SHA256

      f94a84649c33545fe4497254e21de3a3ef206c4873a38fa94372dc8f30b25ed8

    • SHA512

      ee3d5cee848f3509a1e71344b7deb28e06f1a185254cb433c155f8db85420c92537b516d0478429e28f3542b0fa82038779c3744c5c5a45b19a0fe6a61ba7704

    • SSDEEP

      3072:luCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:pzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks