General

  • Target

    JaffaCakes118_79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a

  • Size

    184KB

  • Sample

    241223-xw29hsyjdt

  • MD5

    ce2fd18ed36bffe493b4d26444d6887c

  • SHA1

    98ff55a48598914beaa46198bd1ca33039cbe197

  • SHA256

    79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a

  • SHA512

    60964da59f91ec33d22380bcc56c66e8143ffb008b78ed74bd364e319221d9c717a39f299ba5be4767d701528529044499efae9c736a183a050d1fbe52f61921

  • SSDEEP

    3072:SJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JZa//2uFrSc:TfYOX+wTScR/Xzku9LVwquG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a

    • Size

      184KB

    • MD5

      ce2fd18ed36bffe493b4d26444d6887c

    • SHA1

      98ff55a48598914beaa46198bd1ca33039cbe197

    • SHA256

      79f4f457d7d4a2bae1e87b2e1b86b9bc4304c07136c2a68dbf56ff1d7af17b0a

    • SHA512

      60964da59f91ec33d22380bcc56c66e8143ffb008b78ed74bd364e319221d9c717a39f299ba5be4767d701528529044499efae9c736a183a050d1fbe52f61921

    • SSDEEP

      3072:SJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JZa//2uFrSc:TfYOX+wTScR/Xzku9LVwquG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks