General

  • Target

    JaffaCakes118_51144f9d41ab73e4f2f470d9724c5f79a72559a1d9025d6d3ce3943c12aaa6d4

  • Size

    184KB

  • Sample

    241223-zx2eqa1pal

  • MD5

    07290c2067b103f8f4160104fe6f9d0a

  • SHA1

    0c18b495f0d39d520af5d8a630a96f1354e9e34a

  • SHA256

    51144f9d41ab73e4f2f470d9724c5f79a72559a1d9025d6d3ce3943c12aaa6d4

  • SHA512

    4ac3776308348b1aa67a6b32c29f850ae4f0c7150ab8b6f4db03e70b6e1d5b16e11afe540f51b1381f27729210067c6b701c08aa94abca8b136e31f8e8366576

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaojlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eao5oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_51144f9d41ab73e4f2f470d9724c5f79a72559a1d9025d6d3ce3943c12aaa6d4

    • Size

      184KB

    • MD5

      07290c2067b103f8f4160104fe6f9d0a

    • SHA1

      0c18b495f0d39d520af5d8a630a96f1354e9e34a

    • SHA256

      51144f9d41ab73e4f2f470d9724c5f79a72559a1d9025d6d3ce3943c12aaa6d4

    • SHA512

      4ac3776308348b1aa67a6b32c29f850ae4f0c7150ab8b6f4db03e70b6e1d5b16e11afe540f51b1381f27729210067c6b701c08aa94abca8b136e31f8e8366576

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaojlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eao5oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks