General

  • Target

    JaffaCakes118_91096734b3667faf0e550e76327ae65a485dc85bc5f515677c0d6851dfa26e44

  • Size

    184KB

  • Sample

    241221-1swjca1jft

  • MD5

    08b9a9c061d0bf38099f0c067e36ed1f

  • SHA1

    93c4dfef4830adbd935a60df97dcbf15b419cf90

  • SHA256

    91096734b3667faf0e550e76327ae65a485dc85bc5f515677c0d6851dfa26e44

  • SHA512

    c0c09a85418457bd8721f2a07faf0f6cbd52a81946308dfe7761bb83db4016fe6648264876d72dcafd977fe46a5bfacd962aae79d49e47690448b28e41e39848

  • SSDEEP

    3072:IiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaodlzoxss7:IiLVCIT4WK2z1W+CUHZj4Skq/eaozoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_91096734b3667faf0e550e76327ae65a485dc85bc5f515677c0d6851dfa26e44

    • Size

      184KB

    • MD5

      08b9a9c061d0bf38099f0c067e36ed1f

    • SHA1

      93c4dfef4830adbd935a60df97dcbf15b419cf90

    • SHA256

      91096734b3667faf0e550e76327ae65a485dc85bc5f515677c0d6851dfa26e44

    • SHA512

      c0c09a85418457bd8721f2a07faf0f6cbd52a81946308dfe7761bb83db4016fe6648264876d72dcafd977fe46a5bfacd962aae79d49e47690448b28e41e39848

    • SSDEEP

      3072:IiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaodlzoxss7:IiLVCIT4WK2z1W+CUHZj4Skq/eaozoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks