General

  • Target

    JaffaCakes118_d2d0d0d42c4bc9a6f8d0c9e85860a83cf692925c7be5f09fe741261057d2c6f8

  • Size

    184KB

  • Sample

    241223-vv3gsawkat

  • MD5

    d829a99f2610f6ce90e51ae64f0ebfe0

  • SHA1

    e32aa471f6a6397d7f45a015ca37a1a3ffed940b

  • SHA256

    d2d0d0d42c4bc9a6f8d0c9e85860a83cf692925c7be5f09fe741261057d2c6f8

  • SHA512

    3fa56dfc78869c9a064a5f66d3831ececcc0274d0109992ee0a5fd147eafa180da6d6161195f05a44d2720984925d5ed0775b0abbb82c119cbccfe54ad1ec5c8

  • SSDEEP

    3072:itJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J6a//2uFrSc:tfYOX+wTScR/Xzku9LVwduG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d2d0d0d42c4bc9a6f8d0c9e85860a83cf692925c7be5f09fe741261057d2c6f8

    • Size

      184KB

    • MD5

      d829a99f2610f6ce90e51ae64f0ebfe0

    • SHA1

      e32aa471f6a6397d7f45a015ca37a1a3ffed940b

    • SHA256

      d2d0d0d42c4bc9a6f8d0c9e85860a83cf692925c7be5f09fe741261057d2c6f8

    • SHA512

      3fa56dfc78869c9a064a5f66d3831ececcc0274d0109992ee0a5fd147eafa180da6d6161195f05a44d2720984925d5ed0775b0abbb82c119cbccfe54ad1ec5c8

    • SSDEEP

      3072:itJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J6a//2uFrSc:tfYOX+wTScR/Xzku9LVwduG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks