General

  • Target

    JaffaCakes118_05f26e6df8c4d4f14c5535885d85ded36fbd4f1c516fdcb0bbcd62eda0b203ad

  • Size

    184KB

  • Sample

    241222-jqn8tazpek

  • MD5

    31a16f7feaf6bdffff6153035cf15708

  • SHA1

    7654916bbfef1509543ec74d1aaebde00190cdcd

  • SHA256

    05f26e6df8c4d4f14c5535885d85ded36fbd4f1c516fdcb0bbcd62eda0b203ad

  • SHA512

    62a163a10448369e4e0f79500b33b47d2363ad587424b115b75b6274f41ebe5b9f1dfeb006d0450de1ce96182265e4288340408c982031bb3661a2ec1127d3bd

  • SSDEEP

    3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_05f26e6df8c4d4f14c5535885d85ded36fbd4f1c516fdcb0bbcd62eda0b203ad

    • Size

      184KB

    • MD5

      31a16f7feaf6bdffff6153035cf15708

    • SHA1

      7654916bbfef1509543ec74d1aaebde00190cdcd

    • SHA256

      05f26e6df8c4d4f14c5535885d85ded36fbd4f1c516fdcb0bbcd62eda0b203ad

    • SHA512

      62a163a10448369e4e0f79500b33b47d2363ad587424b115b75b6274f41ebe5b9f1dfeb006d0450de1ce96182265e4288340408c982031bb3661a2ec1127d3bd

    • SSDEEP

      3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks