General

  • Target

    JaffaCakes118_cbc45b0b9a9930c793cd7eb4c1e9bc1fd72f29d9afa63a14ccedf8f76323aa66

  • Size

    184KB

  • Sample

    241223-r5prwssnhm

  • MD5

    2f14de26d231f6768e6cf727b85dac17

  • SHA1

    74ea5f7ae841ae5698efcd040af1b0a496a03734

  • SHA256

    cbc45b0b9a9930c793cd7eb4c1e9bc1fd72f29d9afa63a14ccedf8f76323aa66

  • SHA512

    1d7d0b41811bf14407e43cc7608ceebc080977c150e5bc0df36f16a7811724a614e0dc5e71c2badc691cd4342676c6b9a46cd119894d2a49dec4529180fb71f8

  • SSDEEP

    3072:giLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao0lzoxss7:giLVCIT4WK2z1W+CUHZj4Skq/eaoKoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cbc45b0b9a9930c793cd7eb4c1e9bc1fd72f29d9afa63a14ccedf8f76323aa66

    • Size

      184KB

    • MD5

      2f14de26d231f6768e6cf727b85dac17

    • SHA1

      74ea5f7ae841ae5698efcd040af1b0a496a03734

    • SHA256

      cbc45b0b9a9930c793cd7eb4c1e9bc1fd72f29d9afa63a14ccedf8f76323aa66

    • SHA512

      1d7d0b41811bf14407e43cc7608ceebc080977c150e5bc0df36f16a7811724a614e0dc5e71c2badc691cd4342676c6b9a46cd119894d2a49dec4529180fb71f8

    • SSDEEP

      3072:giLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao0lzoxss7:giLVCIT4WK2z1W+CUHZj4Skq/eaoKoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks