General

  • Target

    JaffaCakes118_c2d254e421ecfece7ddb775e2f9442e1aaeb535464d0c2283a8d0bf5f097ef12

  • Size

    184KB

  • Sample

    241223-1tpgessnfy

  • MD5

    d6b03bc0329655c6dc6607666b362599

  • SHA1

    f85be78e9c95074d0fb27351d8a4a38604a2ee73

  • SHA256

    c2d254e421ecfece7ddb775e2f9442e1aaeb535464d0c2283a8d0bf5f097ef12

  • SHA512

    994fc6a03ac2548cfdc9362b1c656db3ee08d0bf90b418fbd8187b1870c181e0e49bc3147feb349d0be721e4dc51f2a08bf1cdd9a5e6ca2c8c6ebf6b9a54e2fd

  • SSDEEP

    3072:9JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JOa//2uFrSc:GfYOX+wTScR/Xzku9LVwpuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c2d254e421ecfece7ddb775e2f9442e1aaeb535464d0c2283a8d0bf5f097ef12

    • Size

      184KB

    • MD5

      d6b03bc0329655c6dc6607666b362599

    • SHA1

      f85be78e9c95074d0fb27351d8a4a38604a2ee73

    • SHA256

      c2d254e421ecfece7ddb775e2f9442e1aaeb535464d0c2283a8d0bf5f097ef12

    • SHA512

      994fc6a03ac2548cfdc9362b1c656db3ee08d0bf90b418fbd8187b1870c181e0e49bc3147feb349d0be721e4dc51f2a08bf1cdd9a5e6ca2c8c6ebf6b9a54e2fd

    • SSDEEP

      3072:9JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JOa//2uFrSc:GfYOX+wTScR/Xzku9LVwpuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks