General

  • Target

    JaffaCakes118_d43555de6c39b6119d5e72bd4316024fb4c20c358b3e069e997cfeb4c35e92c1

  • Size

    184KB

  • Sample

    241223-vpylmsvrg1

  • MD5

    1ed286f01d991d8713e344be08f7a45a

  • SHA1

    027e247dd0f96f4f25c1411102dda913649eaa40

  • SHA256

    d43555de6c39b6119d5e72bd4316024fb4c20c358b3e069e997cfeb4c35e92c1

  • SHA512

    16b59224248d7230fdd602d7a61e1f4716b7b40b92acc1e58292f1c6b1311a57df949f9fe68fc0485e4b078a97461b997a50cced1a68b8e361466b987c5137e0

  • SSDEEP

    3072:BiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:BiLVCIT4WK2z1W+CUHZj4Skq/eaoYoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d43555de6c39b6119d5e72bd4316024fb4c20c358b3e069e997cfeb4c35e92c1

    • Size

      184KB

    • MD5

      1ed286f01d991d8713e344be08f7a45a

    • SHA1

      027e247dd0f96f4f25c1411102dda913649eaa40

    • SHA256

      d43555de6c39b6119d5e72bd4316024fb4c20c358b3e069e997cfeb4c35e92c1

    • SHA512

      16b59224248d7230fdd602d7a61e1f4716b7b40b92acc1e58292f1c6b1311a57df949f9fe68fc0485e4b078a97461b997a50cced1a68b8e361466b987c5137e0

    • SSDEEP

      3072:BiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:BiLVCIT4WK2z1W+CUHZj4Skq/eaoYoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks