General

  • Target

    JaffaCakes118_c2157b87dc8326de1334a4e9df56bf328f633dd1b6b133340d258be0651a6282

  • Size

    177KB

  • Sample

    241230-gvaj4szrbv

  • MD5

    20bdc1b4cda3f9484530da453cd4ca50

  • SHA1

    856c68821df1c5a7274106f63463b1044a581634

  • SHA256

    c2157b87dc8326de1334a4e9df56bf328f633dd1b6b133340d258be0651a6282

  • SHA512

    ed6763def764aecbd18edb3ce9e7e5a365588c5b95315204b5b30a340a2649b66ecda03a2a129cdd0d71d05ada38acf1f68fedab8187d58f6a375173fc47d78a

  • SSDEEP

    3072:yuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:uzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c2157b87dc8326de1334a4e9df56bf328f633dd1b6b133340d258be0651a6282

    • Size

      177KB

    • MD5

      20bdc1b4cda3f9484530da453cd4ca50

    • SHA1

      856c68821df1c5a7274106f63463b1044a581634

    • SHA256

      c2157b87dc8326de1334a4e9df56bf328f633dd1b6b133340d258be0651a6282

    • SHA512

      ed6763def764aecbd18edb3ce9e7e5a365588c5b95315204b5b30a340a2649b66ecda03a2a129cdd0d71d05ada38acf1f68fedab8187d58f6a375173fc47d78a

    • SSDEEP

      3072:yuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:uzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks