General

  • Target

    JaffaCakes118_3745e6e148db83354c1b532b35f2c86cf0dc94a49bbc02ff86a43e857a36a390

  • Size

    177KB

  • Sample

    241230-fm5vlsyngw

  • MD5

    e23aac4d6a438deed01d58f3aea22129

  • SHA1

    f3af127b5628f062d2a43a7eae02cad0031969d9

  • SHA256

    3745e6e148db83354c1b532b35f2c86cf0dc94a49bbc02ff86a43e857a36a390

  • SHA512

    92305ffc070ed513789d1450fafaf00007250ed2b8bc931a4224a69739817abbc1d9fefb08d818466a18ec00870e7f90effc3e5a88675e43cdc1b72ac44ff7ae

  • SSDEEP

    3072:+uCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:SzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3745e6e148db83354c1b532b35f2c86cf0dc94a49bbc02ff86a43e857a36a390

    • Size

      177KB

    • MD5

      e23aac4d6a438deed01d58f3aea22129

    • SHA1

      f3af127b5628f062d2a43a7eae02cad0031969d9

    • SHA256

      3745e6e148db83354c1b532b35f2c86cf0dc94a49bbc02ff86a43e857a36a390

    • SHA512

      92305ffc070ed513789d1450fafaf00007250ed2b8bc931a4224a69739817abbc1d9fefb08d818466a18ec00870e7f90effc3e5a88675e43cdc1b72ac44ff7ae

    • SSDEEP

      3072:+uCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:SzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks