General

  • Target

    JaffaCakes118_798489424205d5acfa36e9f75253bbd3d4c78a90b3c21faea00a8dc289a456a3

  • Size

    184KB

  • Sample

    241223-z2g7ms1qaq

  • MD5

    c77d34434686aad070e3dd87cb2c0875

  • SHA1

    5702908d86da4cbd5440e21732850c7fad97f661

  • SHA256

    798489424205d5acfa36e9f75253bbd3d4c78a90b3c21faea00a8dc289a456a3

  • SHA512

    8f3c1b54f9f325b3b706293e9eab83ba79fb40bdefe4bdb95020e3ef8b90fb8a56688c708de94483a0bdb85c2acb1b939cdb5f5d4d77ae403b5a1d213f96f11c

  • SSDEEP

    3072:PiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao2lzoxss7:PiLVCIT4WK2z1W+CUHZj4Skq/eaokoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_798489424205d5acfa36e9f75253bbd3d4c78a90b3c21faea00a8dc289a456a3

    • Size

      184KB

    • MD5

      c77d34434686aad070e3dd87cb2c0875

    • SHA1

      5702908d86da4cbd5440e21732850c7fad97f661

    • SHA256

      798489424205d5acfa36e9f75253bbd3d4c78a90b3c21faea00a8dc289a456a3

    • SHA512

      8f3c1b54f9f325b3b706293e9eab83ba79fb40bdefe4bdb95020e3ef8b90fb8a56688c708de94483a0bdb85c2acb1b939cdb5f5d4d77ae403b5a1d213f96f11c

    • SSDEEP

      3072:PiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao2lzoxss7:PiLVCIT4WK2z1W+CUHZj4Skq/eaokoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks