General

  • Target

    JaffaCakes118_ee012eb3f58a01ecbe1ce9bd9ed4c0fa88aa77d61cb5d674eaa3db258330cb58

  • Size

    184KB

  • Sample

    241223-s1rw5atlbs

  • MD5

    00b1c1dc299bd8b05c7636d053a57f98

  • SHA1

    204b21ef3aec94791c54b9c81bd7de885c7a29e1

  • SHA256

    ee012eb3f58a01ecbe1ce9bd9ed4c0fa88aa77d61cb5d674eaa3db258330cb58

  • SHA512

    b302ae72927ed0c943238b804b1d3b91686caad3b934e6f782ac805372a210c874ba9923b8bd406c7a2525ffdbbecb13567c19905a8dc6f0b47cb89510842044

  • SSDEEP

    3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ee012eb3f58a01ecbe1ce9bd9ed4c0fa88aa77d61cb5d674eaa3db258330cb58

    • Size

      184KB

    • MD5

      00b1c1dc299bd8b05c7636d053a57f98

    • SHA1

      204b21ef3aec94791c54b9c81bd7de885c7a29e1

    • SHA256

      ee012eb3f58a01ecbe1ce9bd9ed4c0fa88aa77d61cb5d674eaa3db258330cb58

    • SHA512

      b302ae72927ed0c943238b804b1d3b91686caad3b934e6f782ac805372a210c874ba9923b8bd406c7a2525ffdbbecb13567c19905a8dc6f0b47cb89510842044

    • SSDEEP

      3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao6lzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaoQoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks