General

  • Target

    JaffaCakes118_e698143fcc99891d3ef21c97b1c756956190655cb71af329245822ec2809f9a9

  • Size

    184KB

  • Sample

    241222-h8rwzsyphx

  • MD5

    4824487d2fea73bdb14b6f6ba04e969f

  • SHA1

    531e8c7e48cc01d162b63b41ec4f8360341c69ef

  • SHA256

    e698143fcc99891d3ef21c97b1c756956190655cb71af329245822ec2809f9a9

  • SHA512

    c75b9d2d29e92b6072081389a303ac23ba8dcf1192ef149b80e31ce71b1dc93798b5bb42aedbd79125adaf4e3c0d76dff7965ff3fab80aac28b1023f0a244a40

  • SSDEEP

    3072:UiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoglzoxss7:UiLVCIT4WK2z1W+CUHZj4Skq/eaoeoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e698143fcc99891d3ef21c97b1c756956190655cb71af329245822ec2809f9a9

    • Size

      184KB

    • MD5

      4824487d2fea73bdb14b6f6ba04e969f

    • SHA1

      531e8c7e48cc01d162b63b41ec4f8360341c69ef

    • SHA256

      e698143fcc99891d3ef21c97b1c756956190655cb71af329245822ec2809f9a9

    • SHA512

      c75b9d2d29e92b6072081389a303ac23ba8dcf1192ef149b80e31ce71b1dc93798b5bb42aedbd79125adaf4e3c0d76dff7965ff3fab80aac28b1023f0a244a40

    • SSDEEP

      3072:UiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoglzoxss7:UiLVCIT4WK2z1W+CUHZj4Skq/eaoeoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks