General

  • Target

    JaffaCakes118_7b666277f290cebb16080b0a3e4a2682c78ca014dadab7c5f60fcc0239274fb5

  • Size

    184KB

  • Sample

    241221-1mzntazra1

  • MD5

    ea8664ff48f4fa8a8359fbfe80f42759

  • SHA1

    be0ee2900829b0e5caa1667c07f7f5b49ecb0f59

  • SHA256

    7b666277f290cebb16080b0a3e4a2682c78ca014dadab7c5f60fcc0239274fb5

  • SHA512

    3f4f3d1d4bf94e5ab0d9d2f66fa1084d87e8f0b25851f810e06415a27106d22e73cc176719da665d441881f36c7d0129310516a5dd575e13292f816be9c4a5dc

  • SSDEEP

    3072:piLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoFlzoxss7:piLVCIT4WK2z1W+CUHZj4Skq/eaoLoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7b666277f290cebb16080b0a3e4a2682c78ca014dadab7c5f60fcc0239274fb5

    • Size

      184KB

    • MD5

      ea8664ff48f4fa8a8359fbfe80f42759

    • SHA1

      be0ee2900829b0e5caa1667c07f7f5b49ecb0f59

    • SHA256

      7b666277f290cebb16080b0a3e4a2682c78ca014dadab7c5f60fcc0239274fb5

    • SHA512

      3f4f3d1d4bf94e5ab0d9d2f66fa1084d87e8f0b25851f810e06415a27106d22e73cc176719da665d441881f36c7d0129310516a5dd575e13292f816be9c4a5dc

    • SSDEEP

      3072:piLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoFlzoxss7:piLVCIT4WK2z1W+CUHZj4Skq/eaoLoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks