General

  • Target

    JaffaCakes118_40adb95798a21528f347bff529ad6b8ab6f5083df09196d39b75be89e6cedadb

  • Size

    184KB

  • Sample

    241223-3g7tcavpbp

  • MD5

    81385dc6d98be6b2a7e6b88712dbb9e8

  • SHA1

    4542e19ce21e932a9fdaf4ba3ac0e110827e5b7d

  • SHA256

    40adb95798a21528f347bff529ad6b8ab6f5083df09196d39b75be89e6cedadb

  • SHA512

    d764404a970d0494150cd850d4cc938da55bfbfa1d07cdc5268e5877dffc08f5077e2555d0764367569aa55b3a76d08245e84bfb3c2befeb20e164e6d9dd3941

  • SSDEEP

    3072:WJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JIa//2uFrSc:ffYOX+wTScR/Xzku9LVw/uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_40adb95798a21528f347bff529ad6b8ab6f5083df09196d39b75be89e6cedadb

    • Size

      184KB

    • MD5

      81385dc6d98be6b2a7e6b88712dbb9e8

    • SHA1

      4542e19ce21e932a9fdaf4ba3ac0e110827e5b7d

    • SHA256

      40adb95798a21528f347bff529ad6b8ab6f5083df09196d39b75be89e6cedadb

    • SHA512

      d764404a970d0494150cd850d4cc938da55bfbfa1d07cdc5268e5877dffc08f5077e2555d0764367569aa55b3a76d08245e84bfb3c2befeb20e164e6d9dd3941

    • SSDEEP

      3072:WJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JIa//2uFrSc:ffYOX+wTScR/Xzku9LVw/uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks