General

  • Target

    JaffaCakes118_f139168547c2c942f533d730f7e7015ff5bd1fedc96f1fa4a291a6f55ae00d04

  • Size

    184KB

  • Sample

    241222-n7kdeaxlcy

  • MD5

    9220e520b71994cee15ca8e64a3e8adc

  • SHA1

    86b5f193a835c6cc8c339253134cd85bad72968e

  • SHA256

    f139168547c2c942f533d730f7e7015ff5bd1fedc96f1fa4a291a6f55ae00d04

  • SHA512

    73b25a95a72c70871ec84f93f2eb93e02f8f487ebeac32671f8c7f33c7569b567028b71a9173097738fb6ed0b9ea35ba3f5a1170d468ffe02276212c4f88a74b

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoNlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoDoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f139168547c2c942f533d730f7e7015ff5bd1fedc96f1fa4a291a6f55ae00d04

    • Size

      184KB

    • MD5

      9220e520b71994cee15ca8e64a3e8adc

    • SHA1

      86b5f193a835c6cc8c339253134cd85bad72968e

    • SHA256

      f139168547c2c942f533d730f7e7015ff5bd1fedc96f1fa4a291a6f55ae00d04

    • SHA512

      73b25a95a72c70871ec84f93f2eb93e02f8f487ebeac32671f8c7f33c7569b567028b71a9173097738fb6ed0b9ea35ba3f5a1170d468ffe02276212c4f88a74b

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoNlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoDoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks