General

  • Target

    JaffaCakes118_fdc342844a2d769e4cccc814e3bb86f3d7894622d3c59bb6247b7f6490608b64

  • Size

    184KB

  • Sample

    241222-m584bavrdz

  • MD5

    b7725a90646ebaee9114c74f4de6d70d

  • SHA1

    e7c4d174af783e47789fd95cecb038ca7cf13b8c

  • SHA256

    fdc342844a2d769e4cccc814e3bb86f3d7894622d3c59bb6247b7f6490608b64

  • SHA512

    9f01d94df966d4f8534a679267645ff705aef05ea978279b840a3ebf2a3a078aa3556f008d9caeac9c27627cce653d405c07935346aa0bb8ae8556b11b616157

  • SSDEEP

    3072:biLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:biLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fdc342844a2d769e4cccc814e3bb86f3d7894622d3c59bb6247b7f6490608b64

    • Size

      184KB

    • MD5

      b7725a90646ebaee9114c74f4de6d70d

    • SHA1

      e7c4d174af783e47789fd95cecb038ca7cf13b8c

    • SHA256

      fdc342844a2d769e4cccc814e3bb86f3d7894622d3c59bb6247b7f6490608b64

    • SHA512

      9f01d94df966d4f8534a679267645ff705aef05ea978279b840a3ebf2a3a078aa3556f008d9caeac9c27627cce653d405c07935346aa0bb8ae8556b11b616157

    • SSDEEP

      3072:biLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:biLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks