General

  • Target

    JaffaCakes118_1c732ba70290e0eb9dfa007948a6c65acd5cbb0c59ba725585fdf7faf1dc24c8

  • Size

    184KB

  • Sample

    241223-y9eaaazpdy

  • MD5

    da849bae4bed2e6bcbfc7b379209b574

  • SHA1

    5a0480a43b787d740688327e3e054bb5563d0f02

  • SHA256

    1c732ba70290e0eb9dfa007948a6c65acd5cbb0c59ba725585fdf7faf1dc24c8

  • SHA512

    b09d6508a8d513d23f9649b814742a38faa42e9e8adf7ab14ac186923f6df568d15d34b2160dce7a798eadec1d2319750ab445738a33a23753d8b87cce6fc0e0

  • SSDEEP

    3072:viLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoblzoxss7:viLVCIT4WK2z1W+CUHZj4Skq/eaohoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1c732ba70290e0eb9dfa007948a6c65acd5cbb0c59ba725585fdf7faf1dc24c8

    • Size

      184KB

    • MD5

      da849bae4bed2e6bcbfc7b379209b574

    • SHA1

      5a0480a43b787d740688327e3e054bb5563d0f02

    • SHA256

      1c732ba70290e0eb9dfa007948a6c65acd5cbb0c59ba725585fdf7faf1dc24c8

    • SHA512

      b09d6508a8d513d23f9649b814742a38faa42e9e8adf7ab14ac186923f6df568d15d34b2160dce7a798eadec1d2319750ab445738a33a23753d8b87cce6fc0e0

    • SSDEEP

      3072:viLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoblzoxss7:viLVCIT4WK2z1W+CUHZj4Skq/eaohoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks