General

  • Target

    JaffaCakes118_1e05acc62e5af33cf16d624820cd50239761206ee59b0debd8a87c863cb9b9f5

  • Size

    184KB

  • Sample

    241221-xgk2pawqdl

  • MD5

    6cd497d8200105719c33b3fb3e637bd2

  • SHA1

    10997efe861534af174c9bccd6dcdbbbd86ffa06

  • SHA256

    1e05acc62e5af33cf16d624820cd50239761206ee59b0debd8a87c863cb9b9f5

  • SHA512

    c58b6f21952f4ff3b294aff8e977816ad2fddc96f51f90e35bdf24d7039d2c67f259dc763094fb785e3814ac7788fa6b74ef1ee505f6e7222aec26adc2f1f0c2

  • SSDEEP

    3072:SiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoZlzoxss7:SiLVCIT4WK2z1W+CUHZj4Skq/eaoHoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1e05acc62e5af33cf16d624820cd50239761206ee59b0debd8a87c863cb9b9f5

    • Size

      184KB

    • MD5

      6cd497d8200105719c33b3fb3e637bd2

    • SHA1

      10997efe861534af174c9bccd6dcdbbbd86ffa06

    • SHA256

      1e05acc62e5af33cf16d624820cd50239761206ee59b0debd8a87c863cb9b9f5

    • SHA512

      c58b6f21952f4ff3b294aff8e977816ad2fddc96f51f90e35bdf24d7039d2c67f259dc763094fb785e3814ac7788fa6b74ef1ee505f6e7222aec26adc2f1f0c2

    • SSDEEP

      3072:SiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoZlzoxss7:SiLVCIT4WK2z1W+CUHZj4Skq/eaoHoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks