General

  • Target

    JaffaCakes118_eac58ed3fe71e3a6114f512852514d1e5ea816b6bddf552f03429ad7866f6594

  • Size

    177KB

  • Sample

    241230-w1g9gaspam

  • MD5

    5f4ab6b93e85549c9421a9cc5d3c7c37

  • SHA1

    6e34a41ab18b6a9c43c90e491c54590086323524

  • SHA256

    eac58ed3fe71e3a6114f512852514d1e5ea816b6bddf552f03429ad7866f6594

  • SHA512

    d9ba25b73db88bcc55cf2fe6eab7abdc1e265d1c29bf338a55adfaf85388f69a7486a6f293c4d982a4a880c01677eb036e5ad2ebdc94b803bbbd01e666c11df5

  • SSDEEP

    3072:coNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:3aIzLgKrjbvUAjERycp6c8qgATA2TQUr

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_eac58ed3fe71e3a6114f512852514d1e5ea816b6bddf552f03429ad7866f6594

    • Size

      177KB

    • MD5

      5f4ab6b93e85549c9421a9cc5d3c7c37

    • SHA1

      6e34a41ab18b6a9c43c90e491c54590086323524

    • SHA256

      eac58ed3fe71e3a6114f512852514d1e5ea816b6bddf552f03429ad7866f6594

    • SHA512

      d9ba25b73db88bcc55cf2fe6eab7abdc1e265d1c29bf338a55adfaf85388f69a7486a6f293c4d982a4a880c01677eb036e5ad2ebdc94b803bbbd01e666c11df5

    • SSDEEP

      3072:coNQK/z2dvUgKrjbeSUAjnERwDkCWptcvcb8qgAE0A2C8FQUVac8SurKI6bl/g:3aIzLgKrjbvUAjERycp6c8qgATA2TQUr

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks