General

  • Target

    JaffaCakes118_9a7e68c05a75c35718a53be18ae9c3670d1be8c0acc72c034ca31018b56d59b3

  • Size

    184KB

  • Sample

    241223-1sqcbssncx

  • MD5

    b3a93bed8f05d9738554e341ac0b0d30

  • SHA1

    c1aa7127c468217bd4d793df72836055bcf2511a

  • SHA256

    9a7e68c05a75c35718a53be18ae9c3670d1be8c0acc72c034ca31018b56d59b3

  • SHA512

    ae0237f4e4046d7a19588ca6fcf7376f6d6d9b4ac880b2fac76901a5b2ba360f0caa62118dc6229831c16feb1cfc53761cc7387f892a4d9752ccb7afb0e548bb

  • SSDEEP

    3072:KJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jya//2uFrSc:LfYOX+wTScR/Xzku9LVwpuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_9a7e68c05a75c35718a53be18ae9c3670d1be8c0acc72c034ca31018b56d59b3

    • Size

      184KB

    • MD5

      b3a93bed8f05d9738554e341ac0b0d30

    • SHA1

      c1aa7127c468217bd4d793df72836055bcf2511a

    • SHA256

      9a7e68c05a75c35718a53be18ae9c3670d1be8c0acc72c034ca31018b56d59b3

    • SHA512

      ae0237f4e4046d7a19588ca6fcf7376f6d6d9b4ac880b2fac76901a5b2ba360f0caa62118dc6229831c16feb1cfc53761cc7387f892a4d9752ccb7afb0e548bb

    • SSDEEP

      3072:KJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jya//2uFrSc:LfYOX+wTScR/Xzku9LVwpuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks