General

  • Target

    JaffaCakes118_0f9aac95a7e24b23568f09691b7475b4381168c3b05756ca99f5266e49d4c573

  • Size

    184KB

  • Sample

    241223-zx8tss1pap

  • MD5

    0065e05a62720be6e7c251d62fc18d8c

  • SHA1

    8f09daff74aef19a81667cac18c9d0a1012041ea

  • SHA256

    0f9aac95a7e24b23568f09691b7475b4381168c3b05756ca99f5266e49d4c573

  • SHA512

    ad29fc103a7f5a2c9d4f52f806031ceb9e13bb77ae036a0742884e8e0f8f6d1334d45139a210cc321a396593df9afe3de515c32c2f9b6b20fbd6f557fb468973

  • SSDEEP

    3072:LJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jra//2uFrSc:QfYOX+wTScR/Xzku9LVwouG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0f9aac95a7e24b23568f09691b7475b4381168c3b05756ca99f5266e49d4c573

    • Size

      184KB

    • MD5

      0065e05a62720be6e7c251d62fc18d8c

    • SHA1

      8f09daff74aef19a81667cac18c9d0a1012041ea

    • SHA256

      0f9aac95a7e24b23568f09691b7475b4381168c3b05756ca99f5266e49d4c573

    • SHA512

      ad29fc103a7f5a2c9d4f52f806031ceb9e13bb77ae036a0742884e8e0f8f6d1334d45139a210cc321a396593df9afe3de515c32c2f9b6b20fbd6f557fb468973

    • SSDEEP

      3072:LJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jra//2uFrSc:QfYOX+wTScR/Xzku9LVwouG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks