General

  • Target

    JaffaCakes118_77b6b56e6bf7152b77ece28f44661c298df9f44ca201e4e01c73750fa8b79625

  • Size

    178KB

  • Sample

    241230-wh97javjgx

  • MD5

    e80c517d88fee99a3ef66653241fe9ed

  • SHA1

    665955504177e83b5554b1dc405687d406fe1d7d

  • SHA256

    77b6b56e6bf7152b77ece28f44661c298df9f44ca201e4e01c73750fa8b79625

  • SHA512

    48acbb73d84b4d1e0d5f2fb743d0d2f53c81977bbf659a7cc8e8ebee68218c3dfea557bc324cdac640bc6cba6355949ebe0f31bdfd8faa6daf147551bcb805d2

  • SSDEEP

    3072:xZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:xUAk9I4vgz/V2dulz6/hvOhG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

142.93.223.149:443

128.199.36.62:4664

50.116.54.215:13786

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_77b6b56e6bf7152b77ece28f44661c298df9f44ca201e4e01c73750fa8b79625

    • Size

      178KB

    • MD5

      e80c517d88fee99a3ef66653241fe9ed

    • SHA1

      665955504177e83b5554b1dc405687d406fe1d7d

    • SHA256

      77b6b56e6bf7152b77ece28f44661c298df9f44ca201e4e01c73750fa8b79625

    • SHA512

      48acbb73d84b4d1e0d5f2fb743d0d2f53c81977bbf659a7cc8e8ebee68218c3dfea557bc324cdac640bc6cba6355949ebe0f31bdfd8faa6daf147551bcb805d2

    • SSDEEP

      3072:xZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:xUAk9I4vgz/V2dulz6/hvOhG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks