General

  • Target

    JaffaCakes118_70d66548ae7fae92803956e496451fa5eb8891e06e350ee7cc9f3f801ebc46bb

  • Size

    184KB

  • Sample

    241223-vj2fcavrdq

  • MD5

    bf3c75ad242c7da6ca1aa1f5e13a7ec9

  • SHA1

    b7f8d1229746fce506294c9ef7b8c51418f9be4e

  • SHA256

    70d66548ae7fae92803956e496451fa5eb8891e06e350ee7cc9f3f801ebc46bb

  • SHA512

    c1eafb7c346cb43970d1bee4c0a750d46f4e8e213c7c3e87f5ac4e28cf8d99d2d0604ad9976d702764ae5ab004f2c39d8acd3889bfa62259a77813a160bd9abd

  • SSDEEP

    3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaoYoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_70d66548ae7fae92803956e496451fa5eb8891e06e350ee7cc9f3f801ebc46bb

    • Size

      184KB

    • MD5

      bf3c75ad242c7da6ca1aa1f5e13a7ec9

    • SHA1

      b7f8d1229746fce506294c9ef7b8c51418f9be4e

    • SHA256

      70d66548ae7fae92803956e496451fa5eb8891e06e350ee7cc9f3f801ebc46bb

    • SHA512

      c1eafb7c346cb43970d1bee4c0a750d46f4e8e213c7c3e87f5ac4e28cf8d99d2d0604ad9976d702764ae5ab004f2c39d8acd3889bfa62259a77813a160bd9abd

    • SSDEEP

      3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaoYoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks