General

  • Target

    JaffaCakes118_34177abf4755d23d3e590efc03a5ff39d0cbc581a5e1a19d28d607cc5ef0415b

  • Size

    184KB

  • Sample

    241224-bjn1gaxmbx

  • MD5

    609f5c60cdf8586bca5747da7bdd6282

  • SHA1

    6dc176e5d228474b9412c7a689b4301f9e9dbf71

  • SHA256

    34177abf4755d23d3e590efc03a5ff39d0cbc581a5e1a19d28d607cc5ef0415b

  • SHA512

    d635b475eec5d273df1654503825a41b195dfc47e4068cd60679d3ef5d52f25ad81417eaa0eb593021e271abb5dcba66a34e168ac623e14e1752f04fc97568e7

  • SSDEEP

    3072:rJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JKa//2uFrSc:wfYOX+wTScR/Xzku9LVwhuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
1
XH2KyJtcJ7RSk5n0Ak2zUIsoefdhHZlKRYf
rc4.plain
1
cYEsjNtMnqhfNdGdtxJHObrdyxC7I2RsYqPuLirrwkWgKf0csGFj3Ow4lgY2bwEnd8mTqve

Targets

    • Target

      JaffaCakes118_34177abf4755d23d3e590efc03a5ff39d0cbc581a5e1a19d28d607cc5ef0415b

    • Size

      184KB

    • MD5

      609f5c60cdf8586bca5747da7bdd6282

    • SHA1

      6dc176e5d228474b9412c7a689b4301f9e9dbf71

    • SHA256

      34177abf4755d23d3e590efc03a5ff39d0cbc581a5e1a19d28d607cc5ef0415b

    • SHA512

      d635b475eec5d273df1654503825a41b195dfc47e4068cd60679d3ef5d52f25ad81417eaa0eb593021e271abb5dcba66a34e168ac623e14e1752f04fc97568e7

    • SSDEEP

      3072:rJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JKa//2uFrSc:wfYOX+wTScR/Xzku9LVwhuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.