General

  • Target

    JaffaCakes118_cb0a3af99c51273968202416a9907c331afbb9e1d0597a0942829af2b01bab7d

  • Size

    184KB

  • Sample

    241223-1hlldssleq

  • MD5

    8ab5c1484019a7fa621b3e89c79a55f6

  • SHA1

    c2ae87043fa346bdd55402476116677d4b5ff74f

  • SHA256

    cb0a3af99c51273968202416a9907c331afbb9e1d0597a0942829af2b01bab7d

  • SHA512

    90be638b863a3d83ca4423212032bf578649654c4d3a03de56e5007069b08aacbd51e6148e0bd50b67dd2f20660c2279e5b20113ac45a01f4f80285061233b13

  • SSDEEP

    3072:NJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J9a//2uFrSc:2fYOX+wTScR/Xzku9LVweuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cb0a3af99c51273968202416a9907c331afbb9e1d0597a0942829af2b01bab7d

    • Size

      184KB

    • MD5

      8ab5c1484019a7fa621b3e89c79a55f6

    • SHA1

      c2ae87043fa346bdd55402476116677d4b5ff74f

    • SHA256

      cb0a3af99c51273968202416a9907c331afbb9e1d0597a0942829af2b01bab7d

    • SHA512

      90be638b863a3d83ca4423212032bf578649654c4d3a03de56e5007069b08aacbd51e6148e0bd50b67dd2f20660c2279e5b20113ac45a01f4f80285061233b13

    • SSDEEP

      3072:NJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J9a//2uFrSc:2fYOX+wTScR/Xzku9LVweuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks