General

  • Target

    JaffaCakes118_53869cef2e9e0cb0ec584a4ee649f8eea9a74cab203cbd4a5017bf51c144b21d

  • Size

    184KB

  • Sample

    241223-3m2jhsvnev

  • MD5

    98c39aa5a0e7fd96cf5c2a6a724cc827

  • SHA1

    f1fa7ee99e2f72ff5ca1e537fb175458019905e3

  • SHA256

    53869cef2e9e0cb0ec584a4ee649f8eea9a74cab203cbd4a5017bf51c144b21d

  • SHA512

    4af4ab6bfd37bee08235a3403c14ea533fa5abaa310c7170da862c306c04dd06f64e6007c6f5ea8ba67aae9b29e7a0a2b6312ab3e45890e0025a668f54eb2958

  • SSDEEP

    3072:5iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoalzoxss7:5iLVCIT4WK2z1W+CUHZj4Skq/eaowoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_53869cef2e9e0cb0ec584a4ee649f8eea9a74cab203cbd4a5017bf51c144b21d

    • Size

      184KB

    • MD5

      98c39aa5a0e7fd96cf5c2a6a724cc827

    • SHA1

      f1fa7ee99e2f72ff5ca1e537fb175458019905e3

    • SHA256

      53869cef2e9e0cb0ec584a4ee649f8eea9a74cab203cbd4a5017bf51c144b21d

    • SHA512

      4af4ab6bfd37bee08235a3403c14ea533fa5abaa310c7170da862c306c04dd06f64e6007c6f5ea8ba67aae9b29e7a0a2b6312ab3e45890e0025a668f54eb2958

    • SSDEEP

      3072:5iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoalzoxss7:5iLVCIT4WK2z1W+CUHZj4Skq/eaowoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks