General

  • Target

    JaffaCakes118_e1bd8f08744a400ab014dd3a5bcb186cdf8d1db11d75772f41ba8a66a73ec6f1

  • Size

    178KB

  • Sample

    241230-ygyhfsykcy

  • MD5

    78d13b7c45e52202efcc57e95c0f8c21

  • SHA1

    83733ea1b8fbf168b80f63aab6585316629b9518

  • SHA256

    e1bd8f08744a400ab014dd3a5bcb186cdf8d1db11d75772f41ba8a66a73ec6f1

  • SHA512

    903f6cccb9633b4b8699b9f67bbc4f8deec1680a39a0a56351618856b1477c29100f3e71af021d5e248505478841bd27cd5fb6c203360ccfb46ad77d98c55f7d

  • SSDEEP

    3072:3ZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:3UAk9I4vgz/V2dulz6/hvOhG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

142.93.223.149:443

128.199.36.62:4664

50.116.54.215:13786

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e1bd8f08744a400ab014dd3a5bcb186cdf8d1db11d75772f41ba8a66a73ec6f1

    • Size

      178KB

    • MD5

      78d13b7c45e52202efcc57e95c0f8c21

    • SHA1

      83733ea1b8fbf168b80f63aab6585316629b9518

    • SHA256

      e1bd8f08744a400ab014dd3a5bcb186cdf8d1db11d75772f41ba8a66a73ec6f1

    • SHA512

      903f6cccb9633b4b8699b9f67bbc4f8deec1680a39a0a56351618856b1477c29100f3e71af021d5e248505478841bd27cd5fb6c203360ccfb46ad77d98c55f7d

    • SSDEEP

      3072:3ZUVAk9rsXo3/Ifz/uUXF2mSPBxv1tM7lt8jPU6/pyagsuAtlUucGZ2:3UAk9I4vgz/V2dulz6/hvOhG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks