General

  • Target

    JaffaCakes118_b1ad7e64616276ed1b538704c7931f8383068ef0e0b0548e057f7d70efd5d03e

  • Size

    177KB

  • Sample

    241230-wye2bssncm

  • MD5

    add23348d4a87f1af5149bb00cd80bbe

  • SHA1

    6108245e734d57cab52c10b21975efd5e2cb1c76

  • SHA256

    b1ad7e64616276ed1b538704c7931f8383068ef0e0b0548e057f7d70efd5d03e

  • SHA512

    76ccc40912138b009ca5e320df5e9721b5a8843431d2de1c5053cdd05af22d92cb0348bb99d4718725f21f24ceb355b00a06245917ecbef9ade83dc5f9a3fcd1

  • SSDEEP

    3072:XuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:TzWxkOP4p2EesvcDi6DOHPJ

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

144.76.1.150:443

50.249.212.98:23399

104.168.154.79:5007

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b1ad7e64616276ed1b538704c7931f8383068ef0e0b0548e057f7d70efd5d03e

    • Size

      177KB

    • MD5

      add23348d4a87f1af5149bb00cd80bbe

    • SHA1

      6108245e734d57cab52c10b21975efd5e2cb1c76

    • SHA256

      b1ad7e64616276ed1b538704c7931f8383068ef0e0b0548e057f7d70efd5d03e

    • SHA512

      76ccc40912138b009ca5e320df5e9721b5a8843431d2de1c5053cdd05af22d92cb0348bb99d4718725f21f24ceb355b00a06245917ecbef9ade83dc5f9a3fcd1

    • SSDEEP

      3072:XuCmyBVtWxZCOCA4Hpl1tv18FTETA8ocya/OyoSJPAacbnid8DOHPJ+HJ:TzWxkOP4p2EesvcDi6DOHPJ

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks