General

  • Target

    JaffaCakes118_feec8b5a99fa7377c6898787785e600ad306f94bfa23803297f6f4c395291f4b

  • Size

    184KB

  • Sample

    241222-wwpsravmcz

  • MD5

    7d6340b9c745295074d5ebc554e7bd99

  • SHA1

    e3bced4abe7704af174414a46d6ecf1b08380167

  • SHA256

    feec8b5a99fa7377c6898787785e600ad306f94bfa23803297f6f4c395291f4b

  • SHA512

    acc9bd37906620f3a080853e466aa74aa20b515b551780c79fa583ca943aee10b715e1e6bfb8c39831c4c214a94d03c14bc447e63917216401f22ed6052669a2

  • SSDEEP

    3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoUlzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaoqoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_feec8b5a99fa7377c6898787785e600ad306f94bfa23803297f6f4c395291f4b

    • Size

      184KB

    • MD5

      7d6340b9c745295074d5ebc554e7bd99

    • SHA1

      e3bced4abe7704af174414a46d6ecf1b08380167

    • SHA256

      feec8b5a99fa7377c6898787785e600ad306f94bfa23803297f6f4c395291f4b

    • SHA512

      acc9bd37906620f3a080853e466aa74aa20b515b551780c79fa583ca943aee10b715e1e6bfb8c39831c4c214a94d03c14bc447e63917216401f22ed6052669a2

    • SSDEEP

      3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoUlzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaoqoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks