General

  • Target

    JaffaCakes118_be16c916f71cc1598f749cbd946ad3a2f2edf1b06f71ea662acacce0f1d5f134

  • Size

    184KB

  • Sample

    241223-yk8slayrfw

  • MD5

    e49a31cc8099c4b111fa1dc55eaaf7a2

  • SHA1

    d23571ea787d10bfed022522579477fbdd6c4479

  • SHA256

    be16c916f71cc1598f749cbd946ad3a2f2edf1b06f71ea662acacce0f1d5f134

  • SHA512

    acd5390093a843a0fc0ceeb61fe7720c718cd0a18813abff2970c4b7ec5c52921833cae528bc00d96eafa975de0aaa08e27471b406cc6311be896f6351189ba2

  • SSDEEP

    3072:oJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jca//2uFrSc:lfYOX+wTScR/Xzku9LVwHuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_be16c916f71cc1598f749cbd946ad3a2f2edf1b06f71ea662acacce0f1d5f134

    • Size

      184KB

    • MD5

      e49a31cc8099c4b111fa1dc55eaaf7a2

    • SHA1

      d23571ea787d10bfed022522579477fbdd6c4479

    • SHA256

      be16c916f71cc1598f749cbd946ad3a2f2edf1b06f71ea662acacce0f1d5f134

    • SHA512

      acd5390093a843a0fc0ceeb61fe7720c718cd0a18813abff2970c4b7ec5c52921833cae528bc00d96eafa975de0aaa08e27471b406cc6311be896f6351189ba2

    • SSDEEP

      3072:oJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jca//2uFrSc:lfYOX+wTScR/Xzku9LVwHuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks