General

  • Target

    JaffaCakes118_439bdbe9d547baa444e46a8c175c04ada5caf9f66df8e3c565503c144f5fecc5

  • Size

    184KB

  • Sample

    241222-ynry9axpep

  • MD5

    c2ad881a23246c1764ce3e3cee629355

  • SHA1

    0c84fec09e5ace2d8d8e53e2f8d817622ead0dbf

  • SHA256

    439bdbe9d547baa444e46a8c175c04ada5caf9f66df8e3c565503c144f5fecc5

  • SHA512

    e8a1d846a3d79855dbc4e196be4ec82663ecd5e2f30692abcaa4f5613a14000df92d8412bbb460c1285b8898b49a30d04f73767875c68ef1b291ff9f5bdd51fa

  • SSDEEP

    3072:wiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoJlzoxss7:wiLVCIT4WK2z1W+CUHZj4Skq/eaoXoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_439bdbe9d547baa444e46a8c175c04ada5caf9f66df8e3c565503c144f5fecc5

    • Size

      184KB

    • MD5

      c2ad881a23246c1764ce3e3cee629355

    • SHA1

      0c84fec09e5ace2d8d8e53e2f8d817622ead0dbf

    • SHA256

      439bdbe9d547baa444e46a8c175c04ada5caf9f66df8e3c565503c144f5fecc5

    • SHA512

      e8a1d846a3d79855dbc4e196be4ec82663ecd5e2f30692abcaa4f5613a14000df92d8412bbb460c1285b8898b49a30d04f73767875c68ef1b291ff9f5bdd51fa

    • SSDEEP

      3072:wiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoJlzoxss7:wiLVCIT4WK2z1W+CUHZj4Skq/eaoXoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks