General

  • Target

    JaffaCakes118_0674909630951d59bb48c2bce3c213cf8b53ab5ad0340b99be6b6708439b4a0c

  • Size

    184KB

  • Sample

    241223-rkj1xa1rct

  • MD5

    f9d53acc71b0da9a4c34ec23cfc1ceab

  • SHA1

    407256a972e9c0b6b45596274115a9ca3e4f69c7

  • SHA256

    0674909630951d59bb48c2bce3c213cf8b53ab5ad0340b99be6b6708439b4a0c

  • SHA512

    2aa27719e2d784e0a9641026267545e5e4e1a2b40bc460d5b32d29f59db6584dd01f5819d5dac4fc41aca9c474398297046a99a864eb79b47db9e8805e81adc5

  • SSDEEP

    3072:PiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:PiLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0674909630951d59bb48c2bce3c213cf8b53ab5ad0340b99be6b6708439b4a0c

    • Size

      184KB

    • MD5

      f9d53acc71b0da9a4c34ec23cfc1ceab

    • SHA1

      407256a972e9c0b6b45596274115a9ca3e4f69c7

    • SHA256

      0674909630951d59bb48c2bce3c213cf8b53ab5ad0340b99be6b6708439b4a0c

    • SHA512

      2aa27719e2d784e0a9641026267545e5e4e1a2b40bc460d5b32d29f59db6584dd01f5819d5dac4fc41aca9c474398297046a99a864eb79b47db9e8805e81adc5

    • SSDEEP

      3072:PiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:PiLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks