General

  • Target

    JaffaCakes118_58823e33d9e26271c854e5bbcd4c665c4b73372665062a99d0feaa9233ce11bc

  • Size

    184KB

  • Sample

    241224-andvmawmft

  • MD5

    ed0172d59d21027a88106aa04aa155f5

  • SHA1

    fedc5402e4ebf0ad176bc38c75bb1fc8d3705815

  • SHA256

    58823e33d9e26271c854e5bbcd4c665c4b73372665062a99d0feaa9233ce11bc

  • SHA512

    304108ea09515aec10cc08bdb5dcac265e14a2eb130934160ae3e359ddd2f57ec1cf7b93a9372e54b37ef4c63d3e7c58be0e5cc5ced8363805c24b72f3539150

  • SSDEEP

    3072:7JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JLa//2uFrSc:gfYOX+wTScR/Xzku9LVwUuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_58823e33d9e26271c854e5bbcd4c665c4b73372665062a99d0feaa9233ce11bc

    • Size

      184KB

    • MD5

      ed0172d59d21027a88106aa04aa155f5

    • SHA1

      fedc5402e4ebf0ad176bc38c75bb1fc8d3705815

    • SHA256

      58823e33d9e26271c854e5bbcd4c665c4b73372665062a99d0feaa9233ce11bc

    • SHA512

      304108ea09515aec10cc08bdb5dcac265e14a2eb130934160ae3e359ddd2f57ec1cf7b93a9372e54b37ef4c63d3e7c58be0e5cc5ced8363805c24b72f3539150

    • SSDEEP

      3072:7JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JLa//2uFrSc:gfYOX+wTScR/Xzku9LVwUuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks