General

  • Target

    JaffaCakes118_f6622d127ab3c986172f635a506e1dc4c2258d78d77c6bdfa8835bc1e0b3b84d

  • Size

    184KB

  • Sample

    241222-zbqfbsxrey

  • MD5

    6aeab2d9680f73610d4c8cf5fb59340f

  • SHA1

    a7db4f74a3537f65cad1600d44a7ec12cf537c3d

  • SHA256

    f6622d127ab3c986172f635a506e1dc4c2258d78d77c6bdfa8835bc1e0b3b84d

  • SHA512

    e05eb8031ffce9602cb2653725a87569ef70fa8f8db14b99f96858926d3e396beda76d432b4952bf0099b536e873a38ac53fa0a7e29f2a3ac2a8824875fdf70f

  • SSDEEP

    3072:7iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoMlzoxss7:7iLVCIT4WK2z1W+CUHZj4Skq/eaoyoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f6622d127ab3c986172f635a506e1dc4c2258d78d77c6bdfa8835bc1e0b3b84d

    • Size

      184KB

    • MD5

      6aeab2d9680f73610d4c8cf5fb59340f

    • SHA1

      a7db4f74a3537f65cad1600d44a7ec12cf537c3d

    • SHA256

      f6622d127ab3c986172f635a506e1dc4c2258d78d77c6bdfa8835bc1e0b3b84d

    • SHA512

      e05eb8031ffce9602cb2653725a87569ef70fa8f8db14b99f96858926d3e396beda76d432b4952bf0099b536e873a38ac53fa0a7e29f2a3ac2a8824875fdf70f

    • SSDEEP

      3072:7iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoMlzoxss7:7iLVCIT4WK2z1W+CUHZj4Skq/eaoyoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks