General

  • Target

    JaffaCakes118_dad092a98d3a72b1d47d45b93da4c1817ffc689b8adedc384f31c855a7764e3d

  • Size

    184KB

  • Sample

    241223-1hbq7aslel

  • MD5

    27694c8a59a408b51cfe6f5386b20790

  • SHA1

    7069f2c9fbeade8e2c6584c9b099cd74ad9f26c4

  • SHA256

    dad092a98d3a72b1d47d45b93da4c1817ffc689b8adedc384f31c855a7764e3d

  • SHA512

    455aabfaec10d343eebfd425208b31d02443cecdb4cfe3bf48e7d9b3a0c018c5b0def69062c038bd09b61341d1d29f91983bc1611e2ff310045005a62f28e32a

  • SSDEEP

    3072:2JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jsa//2uFrSc:/fYOX+wTScR/Xzku9LVwXuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_dad092a98d3a72b1d47d45b93da4c1817ffc689b8adedc384f31c855a7764e3d

    • Size

      184KB

    • MD5

      27694c8a59a408b51cfe6f5386b20790

    • SHA1

      7069f2c9fbeade8e2c6584c9b099cd74ad9f26c4

    • SHA256

      dad092a98d3a72b1d47d45b93da4c1817ffc689b8adedc384f31c855a7764e3d

    • SHA512

      455aabfaec10d343eebfd425208b31d02443cecdb4cfe3bf48e7d9b3a0c018c5b0def69062c038bd09b61341d1d29f91983bc1611e2ff310045005a62f28e32a

    • SSDEEP

      3072:2JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jsa//2uFrSc:/fYOX+wTScR/Xzku9LVwXuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks