General

  • Target

    JaffaCakes118_6945fc942251712ab81e71718fe89a02a5f9f2e6a7e51674a9b6e28fcec122f3

  • Size

    177KB

  • Sample

    241230-vpt88asrcw

  • MD5

    dda05e7a7e2dd829b4a6717ec42d125d

  • SHA1

    f73d221c7a090d78d530cdd4975cf89ad4f171e2

  • SHA256

    6945fc942251712ab81e71718fe89a02a5f9f2e6a7e51674a9b6e28fcec122f3

  • SHA512

    3722f34c3551c6d6f5d33c71299462d1c5c71e34a231e0599009b7ca031c482c3c0e6a1c0da34b79530d2e059b5d0545083c3837cfa576fe9c13ebd5b0e9c113

  • SSDEEP

    3072:2uCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:qzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6945fc942251712ab81e71718fe89a02a5f9f2e6a7e51674a9b6e28fcec122f3

    • Size

      177KB

    • MD5

      dda05e7a7e2dd829b4a6717ec42d125d

    • SHA1

      f73d221c7a090d78d530cdd4975cf89ad4f171e2

    • SHA256

      6945fc942251712ab81e71718fe89a02a5f9f2e6a7e51674a9b6e28fcec122f3

    • SHA512

      3722f34c3551c6d6f5d33c71299462d1c5c71e34a231e0599009b7ca031c482c3c0e6a1c0da34b79530d2e059b5d0545083c3837cfa576fe9c13ebd5b0e9c113

    • SSDEEP

      3072:2uCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:qzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks