General

  • Target

    JaffaCakes118_acf4d45ee0565b72fbb9915a98f9ef4309ed5b4b6b1924f1fbbc12d06b9f94ec

  • Size

    184KB

  • Sample

    241224-b6nm8aylhr

  • MD5

    bc2551facb26c14e604a30e6d0d75fbd

  • SHA1

    fee581ccad7a580a5430cee37389c547f8d4918e

  • SHA256

    acf4d45ee0565b72fbb9915a98f9ef4309ed5b4b6b1924f1fbbc12d06b9f94ec

  • SHA512

    b8d55a01de10832564c146919006d53a617c2326302d4d0bb312b5368b4bc2f110f0291b0bf408a3b81ec20d06e88fa126532747970fd9a6071da2a54f7cda16

  • SSDEEP

    3072:8JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JUa//2uFrSc:BfYOX+wTScR/Xzku9LVwjuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_acf4d45ee0565b72fbb9915a98f9ef4309ed5b4b6b1924f1fbbc12d06b9f94ec

    • Size

      184KB

    • MD5

      bc2551facb26c14e604a30e6d0d75fbd

    • SHA1

      fee581ccad7a580a5430cee37389c547f8d4918e

    • SHA256

      acf4d45ee0565b72fbb9915a98f9ef4309ed5b4b6b1924f1fbbc12d06b9f94ec

    • SHA512

      b8d55a01de10832564c146919006d53a617c2326302d4d0bb312b5368b4bc2f110f0291b0bf408a3b81ec20d06e88fa126532747970fd9a6071da2a54f7cda16

    • SSDEEP

      3072:8JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JUa//2uFrSc:BfYOX+wTScR/Xzku9LVwjuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks