General

  • Target

    JaffaCakes118_14bfbd0364d134e88d959d71eee96f119d988d81e98dab470034f3c40face603

  • Size

    177KB

  • Sample

    241230-gdyklszmfx

  • MD5

    a50939d797b89c27b570cc5bec9a72e6

  • SHA1

    9c6ae185020ae5da7603f8f1f773e55267c757d7

  • SHA256

    14bfbd0364d134e88d959d71eee96f119d988d81e98dab470034f3c40face603

  • SHA512

    4bd707c3ab7b1c2e7124b7bc52605fa439d794a6070709cf89dacf9233bad2dad5fb4e43d1d1fa0e05937a63c629f35cb801a6e7cee4b8a21bb5f0f4da02c457

  • SSDEEP

    3072:AoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SlrKI6bl/g:zaIzLgKrjbvUAjERycp6c8qgATA2TQUK

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_14bfbd0364d134e88d959d71eee96f119d988d81e98dab470034f3c40face603

    • Size

      177KB

    • MD5

      a50939d797b89c27b570cc5bec9a72e6

    • SHA1

      9c6ae185020ae5da7603f8f1f773e55267c757d7

    • SHA256

      14bfbd0364d134e88d959d71eee96f119d988d81e98dab470034f3c40face603

    • SHA512

      4bd707c3ab7b1c2e7124b7bc52605fa439d794a6070709cf89dacf9233bad2dad5fb4e43d1d1fa0e05937a63c629f35cb801a6e7cee4b8a21bb5f0f4da02c457

    • SSDEEP

      3072:AoNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SlrKI6bl/g:zaIzLgKrjbvUAjERycp6c8qgATA2TQUK

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks