General

  • Target

    JaffaCakes118_183cf6d5bea3ab3daff6b5d569791ff3b8692db299c6b103c14e15c9d5918484

  • Size

    184KB

  • Sample

    241223-1tmylasnfx

  • MD5

    7483cbb2b0b473393f8080ca731b0d14

  • SHA1

    f1ab9c6681176746cb3d9223b4eb23edda03f59d

  • SHA256

    183cf6d5bea3ab3daff6b5d569791ff3b8692db299c6b103c14e15c9d5918484

  • SHA512

    4d24b52444630db4da568275b7697196deca764424d5f75d9b12fd61075c7239f09c0f1c0d10742b11a24b9b362f0f7e9e49d1b11c06fc2557bbc96388e8cd11

  • SSDEEP

    3072:GJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JKa//2uFrSc:vfYOX+wTScR/Xzku9LVwtuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_183cf6d5bea3ab3daff6b5d569791ff3b8692db299c6b103c14e15c9d5918484

    • Size

      184KB

    • MD5

      7483cbb2b0b473393f8080ca731b0d14

    • SHA1

      f1ab9c6681176746cb3d9223b4eb23edda03f59d

    • SHA256

      183cf6d5bea3ab3daff6b5d569791ff3b8692db299c6b103c14e15c9d5918484

    • SHA512

      4d24b52444630db4da568275b7697196deca764424d5f75d9b12fd61075c7239f09c0f1c0d10742b11a24b9b362f0f7e9e49d1b11c06fc2557bbc96388e8cd11

    • SSDEEP

      3072:GJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JKa//2uFrSc:vfYOX+wTScR/Xzku9LVwtuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks