General

  • Target

    JaffaCakes118_f76f18700a2d07a84243d9e553268f0d045b5af05ee270b9e8b11ade0db92f72

  • Size

    177KB

  • Sample

    241230-grxkgazqcj

  • MD5

    29d59b0af8269a2975aa1e4cd72632cb

  • SHA1

    4e6fb3804a68db1862ee7f9d6073f79ab4c1c412

  • SHA256

    f76f18700a2d07a84243d9e553268f0d045b5af05ee270b9e8b11ade0db92f72

  • SHA512

    7683ae1787ed17fec47cbc335a6b2e8ee563805cefcd3ffebb28b9b1b8f928e502c54d9456bc39c3f1e3f3fb3a55f4d570039cc125b25ebdf6478865af2cd9e7

  • SSDEEP

    3072:4uCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:EzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f76f18700a2d07a84243d9e553268f0d045b5af05ee270b9e8b11ade0db92f72

    • Size

      177KB

    • MD5

      29d59b0af8269a2975aa1e4cd72632cb

    • SHA1

      4e6fb3804a68db1862ee7f9d6073f79ab4c1c412

    • SHA256

      f76f18700a2d07a84243d9e553268f0d045b5af05ee270b9e8b11ade0db92f72

    • SHA512

      7683ae1787ed17fec47cbc335a6b2e8ee563805cefcd3ffebb28b9b1b8f928e502c54d9456bc39c3f1e3f3fb3a55f4d570039cc125b25ebdf6478865af2cd9e7

    • SSDEEP

      3072:4uCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:EzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks