General

  • Target

    JaffaCakes118_2d6c1616bc2af397cc26f18a0ce1f8fa5c715500d7b8986f1779e0c8040d66c9

  • Size

    184KB

  • Sample

    241223-wv5sksxjd1

  • MD5

    c0df5cfa9b754d60160e477445962502

  • SHA1

    7ae417348853b617dc7224cf315d8173142405a5

  • SHA256

    2d6c1616bc2af397cc26f18a0ce1f8fa5c715500d7b8986f1779e0c8040d66c9

  • SHA512

    31aa74f97caef9d8379a7df51fab692f61627cbf3f1eb7996312d0d6f4679406f55b444f790c0d93f7f4d6fb2bd4fa528b2695d95f50097b22eeabf960d0304e

  • SSDEEP

    3072:NJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JDa//2uFrSc:2fYOX+wTScR/Xzku9LVw4uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2d6c1616bc2af397cc26f18a0ce1f8fa5c715500d7b8986f1779e0c8040d66c9

    • Size

      184KB

    • MD5

      c0df5cfa9b754d60160e477445962502

    • SHA1

      7ae417348853b617dc7224cf315d8173142405a5

    • SHA256

      2d6c1616bc2af397cc26f18a0ce1f8fa5c715500d7b8986f1779e0c8040d66c9

    • SHA512

      31aa74f97caef9d8379a7df51fab692f61627cbf3f1eb7996312d0d6f4679406f55b444f790c0d93f7f4d6fb2bd4fa528b2695d95f50097b22eeabf960d0304e

    • SSDEEP

      3072:NJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JDa//2uFrSc:2fYOX+wTScR/Xzku9LVw4uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks