General

  • Target

    JaffaCakes118_fbe61959f8c899f092713449765e0406014b6867cb3c1374a58511b46a9bbc6c

  • Size

    184KB

  • Sample

    241223-xbggbaxmev

  • MD5

    51c9edd3bb6b7ce71ff6f97825a9ac3c

  • SHA1

    8a5652080ff74b76f020269a072ae74d74f2b091

  • SHA256

    fbe61959f8c899f092713449765e0406014b6867cb3c1374a58511b46a9bbc6c

  • SHA512

    9d022f2a98e07ed363877510f2c2aec127013f0eda53a0e0faee99333533c5d4635426eef4bb81c29a18c7badc5e58caf0dc212b1a33513480e12c3407ec2c91

  • SSDEEP

    3072:XiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoAlzoxss7:XiLVCIT4WK2z1W+CUHZj4Skq/eao+oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fbe61959f8c899f092713449765e0406014b6867cb3c1374a58511b46a9bbc6c

    • Size

      184KB

    • MD5

      51c9edd3bb6b7ce71ff6f97825a9ac3c

    • SHA1

      8a5652080ff74b76f020269a072ae74d74f2b091

    • SHA256

      fbe61959f8c899f092713449765e0406014b6867cb3c1374a58511b46a9bbc6c

    • SHA512

      9d022f2a98e07ed363877510f2c2aec127013f0eda53a0e0faee99333533c5d4635426eef4bb81c29a18c7badc5e58caf0dc212b1a33513480e12c3407ec2c91

    • SSDEEP

      3072:XiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoAlzoxss7:XiLVCIT4WK2z1W+CUHZj4Skq/eao+oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks