General

  • Target

    JaffaCakes118_8b98d2b8ae711301b5ec8e4f5420f161d3ae624381dddd590e204b5e55b241fe

  • Size

    184KB

  • Sample

    241223-22y69svkdl

  • MD5

    9798f73c0fd538bef25009626f2ad43c

  • SHA1

    984ffb5a6a32c1349b9f3a17d1fce7ae9c0fba19

  • SHA256

    8b98d2b8ae711301b5ec8e4f5420f161d3ae624381dddd590e204b5e55b241fe

  • SHA512

    c72ceafd54b32116c679ee92869374353fa2251f7bb93951aec554fdef77c57fe982d383f0f5b7e0a14493d614b7b4caf3b49b5b55c1c484a6ea288c5e3f32a2

  • SSDEEP

    3072:7JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JAa//2uFrSc:gfYOX+wTScR/Xzku9LVwzuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8b98d2b8ae711301b5ec8e4f5420f161d3ae624381dddd590e204b5e55b241fe

    • Size

      184KB

    • MD5

      9798f73c0fd538bef25009626f2ad43c

    • SHA1

      984ffb5a6a32c1349b9f3a17d1fce7ae9c0fba19

    • SHA256

      8b98d2b8ae711301b5ec8e4f5420f161d3ae624381dddd590e204b5e55b241fe

    • SHA512

      c72ceafd54b32116c679ee92869374353fa2251f7bb93951aec554fdef77c57fe982d383f0f5b7e0a14493d614b7b4caf3b49b5b55c1c484a6ea288c5e3f32a2

    • SSDEEP

      3072:7JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JAa//2uFrSc:gfYOX+wTScR/Xzku9LVwzuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks