General

  • Target

    JaffaCakes118_a205d82faae4300b3e470b5708a43f6b2779c9d7d5b18636c82d656bc09a33d1

  • Size

    184KB

  • Sample

    241224-ae2v4awket

  • MD5

    59d3cb6174c0c880abdd3a27099fafee

  • SHA1

    7beb2c8437af1d24f7602c28da4333d1902f04f0

  • SHA256

    a205d82faae4300b3e470b5708a43f6b2779c9d7d5b18636c82d656bc09a33d1

  • SHA512

    f4f4bb1b0d149c2991a87b360196471883ae331c5d40ec942fb9cd2df6075d4dfca770c0d921f9a1dc87b686c1582fd47259f74473d52a5f88d2c3bae13eea39

  • SSDEEP

    3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jma//2uFrSc:mfYOX+wTScR/Xzku9LVwhuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a205d82faae4300b3e470b5708a43f6b2779c9d7d5b18636c82d656bc09a33d1

    • Size

      184KB

    • MD5

      59d3cb6174c0c880abdd3a27099fafee

    • SHA1

      7beb2c8437af1d24f7602c28da4333d1902f04f0

    • SHA256

      a205d82faae4300b3e470b5708a43f6b2779c9d7d5b18636c82d656bc09a33d1

    • SHA512

      f4f4bb1b0d149c2991a87b360196471883ae331c5d40ec942fb9cd2df6075d4dfca770c0d921f9a1dc87b686c1582fd47259f74473d52a5f88d2c3bae13eea39

    • SSDEEP

      3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jma//2uFrSc:mfYOX+wTScR/Xzku9LVwhuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks