General

  • Target

    JaffaCakes118_5d267e22a10aa43e7ba32261ca9289c74a86b813f04db753e4034a0e85b8a633

  • Size

    184KB

  • Sample

    241223-3zdcfswkfj

  • MD5

    d94b4dcef0a68fdfa1b1f9dc4b800a1e

  • SHA1

    e39fd8f349e477bd26ae4e05988028917e6ca43c

  • SHA256

    5d267e22a10aa43e7ba32261ca9289c74a86b813f04db753e4034a0e85b8a633

  • SHA512

    8c89d958e98816714263ef8eb076381c13d3c1c732477b185b87cb51175c48c374fe6c3416dcc5165810ef5b3f9545a4555690b257c6866640e9f84a9ad772d3

  • SSDEEP

    3072:1JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JOa//2uFrSc:+fYOX+wTScR/Xzku9LVwJuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5d267e22a10aa43e7ba32261ca9289c74a86b813f04db753e4034a0e85b8a633

    • Size

      184KB

    • MD5

      d94b4dcef0a68fdfa1b1f9dc4b800a1e

    • SHA1

      e39fd8f349e477bd26ae4e05988028917e6ca43c

    • SHA256

      5d267e22a10aa43e7ba32261ca9289c74a86b813f04db753e4034a0e85b8a633

    • SHA512

      8c89d958e98816714263ef8eb076381c13d3c1c732477b185b87cb51175c48c374fe6c3416dcc5165810ef5b3f9545a4555690b257c6866640e9f84a9ad772d3

    • SSDEEP

      3072:1JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JOa//2uFrSc:+fYOX+wTScR/Xzku9LVwJuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks