General

  • Target

    JaffaCakes118_70f35466d6b9bc658c72857c1e66cedb024811e38726ce478c17cd9a188dd839

  • Size

    184KB

  • Sample

    241222-ww16savmdw

  • MD5

    52fd67efdc0b613d6bfbf9ca5c026a54

  • SHA1

    6e3f97b9045698b708f6c3d561f370122a8a248b

  • SHA256

    70f35466d6b9bc658c72857c1e66cedb024811e38726ce478c17cd9a188dd839

  • SHA512

    3110a579fe29e7ac08cec0d5aa9a998c402b549f2640c2eb5fc4ad5b112b983e474df38928c21df289637c0366d49a208b2b89fab373fe3835990ad88118725d

  • SSDEEP

    3072:tiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoQlzoxss7:tiLVCIT4WK2z1W+CUHZj4Skq/eaouoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_70f35466d6b9bc658c72857c1e66cedb024811e38726ce478c17cd9a188dd839

    • Size

      184KB

    • MD5

      52fd67efdc0b613d6bfbf9ca5c026a54

    • SHA1

      6e3f97b9045698b708f6c3d561f370122a8a248b

    • SHA256

      70f35466d6b9bc658c72857c1e66cedb024811e38726ce478c17cd9a188dd839

    • SHA512

      3110a579fe29e7ac08cec0d5aa9a998c402b549f2640c2eb5fc4ad5b112b983e474df38928c21df289637c0366d49a208b2b89fab373fe3835990ad88118725d

    • SSDEEP

      3072:tiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoQlzoxss7:tiLVCIT4WK2z1W+CUHZj4Skq/eaouoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks