General

  • Target

    JaffaCakes118_8c70e34e4de5976c45fa3dde65c40ba93fd39f16f43b571ba71c5c7bd347022f

  • Size

    184KB

  • Sample

    241223-wfnkrawpfl

  • MD5

    dcf4f4af9320de1cdcf1fb528100707e

  • SHA1

    0744a39f755481e5f29dc869de144bd080adf29c

  • SHA256

    8c70e34e4de5976c45fa3dde65c40ba93fd39f16f43b571ba71c5c7bd347022f

  • SHA512

    ca00cc6f2ad722ac5c22d870a90d3afd51d46a4ff0ff99cacb41a1bc8dd316bae34887573c01374b50881b75546e30f2be61fcfc4fb3d69cd64636ec4d48c510

  • SSDEEP

    3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jha//2uFrSc:mfYOX+wTScR/Xzku9LVwiuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8c70e34e4de5976c45fa3dde65c40ba93fd39f16f43b571ba71c5c7bd347022f

    • Size

      184KB

    • MD5

      dcf4f4af9320de1cdcf1fb528100707e

    • SHA1

      0744a39f755481e5f29dc869de144bd080adf29c

    • SHA256

      8c70e34e4de5976c45fa3dde65c40ba93fd39f16f43b571ba71c5c7bd347022f

    • SHA512

      ca00cc6f2ad722ac5c22d870a90d3afd51d46a4ff0ff99cacb41a1bc8dd316bae34887573c01374b50881b75546e30f2be61fcfc4fb3d69cd64636ec4d48c510

    • SSDEEP

      3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jha//2uFrSc:mfYOX+wTScR/Xzku9LVwiuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks