General

  • Target

    JaffaCakes118_6319748bd624da602ba845e1926db5578e6dd2a829a17aa0fa0ab7a3b39a3e7c

  • Size

    184KB

  • Sample

    241223-zvy7ks1mcs

  • MD5

    93cbcdc9761a83236d91a8b2c19dd2b2

  • SHA1

    23c06476006f0c9d63d7077e557c8d01f1d32b1c

  • SHA256

    6319748bd624da602ba845e1926db5578e6dd2a829a17aa0fa0ab7a3b39a3e7c

  • SHA512

    81cef1adef943cef9158bc94228c56f47ceecc3ec8f5aa25db2e419cf0993e2d830ae5a5c783c1e6c45d976373d0eb7f029bdc0a7ac26ad7af59a85d560ae220

  • SSDEEP

    3072:PJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jda//2uFrSc:cfYOX+wTScR/Xzku9LVwauG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6319748bd624da602ba845e1926db5578e6dd2a829a17aa0fa0ab7a3b39a3e7c

    • Size

      184KB

    • MD5

      93cbcdc9761a83236d91a8b2c19dd2b2

    • SHA1

      23c06476006f0c9d63d7077e557c8d01f1d32b1c

    • SHA256

      6319748bd624da602ba845e1926db5578e6dd2a829a17aa0fa0ab7a3b39a3e7c

    • SHA512

      81cef1adef943cef9158bc94228c56f47ceecc3ec8f5aa25db2e419cf0993e2d830ae5a5c783c1e6c45d976373d0eb7f029bdc0a7ac26ad7af59a85d560ae220

    • SSDEEP

      3072:PJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jda//2uFrSc:cfYOX+wTScR/Xzku9LVwauG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks