General

  • Target

    JaffaCakes118_ff6079ab7870da9ab973903920cd2165513a2b7a4c8b5c87f9f65e92a0256195

  • Size

    177KB

  • Sample

    241230-fjnf6ayndr

  • MD5

    d7ceefe7dc5a239a233972f70d0d71de

  • SHA1

    0889ed84a7885729b22caf83b0c612d926d1493b

  • SHA256

    ff6079ab7870da9ab973903920cd2165513a2b7a4c8b5c87f9f65e92a0256195

  • SHA512

    42c8c9b869bd2544c8b7e76dd86dce21abf9ebafd55add319c6b59c970a9ba5afacb5f5463ee0d125f96f4478171a9388bc41599a644a87438a548ff49aad797

  • SSDEEP

    3072:BoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SlrKI6bl/g:CaIzLgKrjbvUAjERycp6c8qgATA2TQUK

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ff6079ab7870da9ab973903920cd2165513a2b7a4c8b5c87f9f65e92a0256195

    • Size

      177KB

    • MD5

      d7ceefe7dc5a239a233972f70d0d71de

    • SHA1

      0889ed84a7885729b22caf83b0c612d926d1493b

    • SHA256

      ff6079ab7870da9ab973903920cd2165513a2b7a4c8b5c87f9f65e92a0256195

    • SHA512

      42c8c9b869bd2544c8b7e76dd86dce21abf9ebafd55add319c6b59c970a9ba5afacb5f5463ee0d125f96f4478171a9388bc41599a644a87438a548ff49aad797

    • SSDEEP

      3072:BoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SlrKI6bl/g:CaIzLgKrjbvUAjERycp6c8qgATA2TQUK

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks