General

  • Target

    JaffaCakes118_4ca8cbfd1465b26398042d417bf1bcbc6a3189a463211769d59a57b525b2e4d6

  • Size

    184KB

  • Sample

    241222-g453daxndm

  • MD5

    f2d9111e1119da5220a1ff709934f790

  • SHA1

    6f1371f3ea07217fa0eacc9bc245f3646c988b34

  • SHA256

    4ca8cbfd1465b26398042d417bf1bcbc6a3189a463211769d59a57b525b2e4d6

  • SHA512

    240a7fd66ad10b2d408a0e974895370f809bfdd4226ce5ccf1def8eaeddc9f354614f8470cad40f29b4da3f552faf6ab334a093da30131062c081d42d6b4149a

  • SSDEEP

    3072:XiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao+lzoxss7:XiLVCIT4WK2z1W+CUHZj4Skq/eaocoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4ca8cbfd1465b26398042d417bf1bcbc6a3189a463211769d59a57b525b2e4d6

    • Size

      184KB

    • MD5

      f2d9111e1119da5220a1ff709934f790

    • SHA1

      6f1371f3ea07217fa0eacc9bc245f3646c988b34

    • SHA256

      4ca8cbfd1465b26398042d417bf1bcbc6a3189a463211769d59a57b525b2e4d6

    • SHA512

      240a7fd66ad10b2d408a0e974895370f809bfdd4226ce5ccf1def8eaeddc9f354614f8470cad40f29b4da3f552faf6ab334a093da30131062c081d42d6b4149a

    • SSDEEP

      3072:XiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao+lzoxss7:XiLVCIT4WK2z1W+CUHZj4Skq/eaocoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks