General

  • Target

    JaffaCakes118_1122185329c038f54003d453bbefbd1ce5c72dd6d76f7ab3e904a23723aaeccc

  • Size

    184KB

  • Sample

    241222-cdbcvsylhy

  • MD5

    5f462ac0711019c1e655d50e168e7034

  • SHA1

    828c6b2f3650b0267ca1b5998018f1563a8b3542

  • SHA256

    1122185329c038f54003d453bbefbd1ce5c72dd6d76f7ab3e904a23723aaeccc

  • SHA512

    a5b1ecdc38d72d562a1134b97cac9e6bd5abfb01022d9a77d06364f6c0a2436e11d7f9f7d83e56a8afc2170e6cb3a5b1c93903f5ddc9b74aefebe56bec9eccfa

  • SSDEEP

    3072:YiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoflzoxss7:YiLVCIT4WK2z1W+CUHZj4Skq/eao9oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1122185329c038f54003d453bbefbd1ce5c72dd6d76f7ab3e904a23723aaeccc

    • Size

      184KB

    • MD5

      5f462ac0711019c1e655d50e168e7034

    • SHA1

      828c6b2f3650b0267ca1b5998018f1563a8b3542

    • SHA256

      1122185329c038f54003d453bbefbd1ce5c72dd6d76f7ab3e904a23723aaeccc

    • SHA512

      a5b1ecdc38d72d562a1134b97cac9e6bd5abfb01022d9a77d06364f6c0a2436e11d7f9f7d83e56a8afc2170e6cb3a5b1c93903f5ddc9b74aefebe56bec9eccfa

    • SSDEEP

      3072:YiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoflzoxss7:YiLVCIT4WK2z1W+CUHZj4Skq/eao9oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks