General

  • Target

    JaffaCakes118_d2e37bc6658b1aa63ced167cf4e87eb1177e7849f6e3ef68a895c58407eed09c

  • Size

    184KB

  • Sample

    241224-c24djszlhp

  • MD5

    237a838b93d19002ed6157d955dc61ed

  • SHA1

    e2ea27b7ffbd58f5b42a180e5bc366ac0bfcf13e

  • SHA256

    d2e37bc6658b1aa63ced167cf4e87eb1177e7849f6e3ef68a895c58407eed09c

  • SHA512

    c56fcd14e75c8ef160a94b9a6400ace631d7a1e8fb95c6a060046a0e4bfea3f6f78cee0bcaf455e256a79ac2fd4a958319353b8f793f2d13aa9f493cea67bdfc

  • SSDEEP

    3072:kJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J3a//2uFrSc:JfYOX+wTScR/Xzku9LVw4uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d2e37bc6658b1aa63ced167cf4e87eb1177e7849f6e3ef68a895c58407eed09c

    • Size

      184KB

    • MD5

      237a838b93d19002ed6157d955dc61ed

    • SHA1

      e2ea27b7ffbd58f5b42a180e5bc366ac0bfcf13e

    • SHA256

      d2e37bc6658b1aa63ced167cf4e87eb1177e7849f6e3ef68a895c58407eed09c

    • SHA512

      c56fcd14e75c8ef160a94b9a6400ace631d7a1e8fb95c6a060046a0e4bfea3f6f78cee0bcaf455e256a79ac2fd4a958319353b8f793f2d13aa9f493cea67bdfc

    • SSDEEP

      3072:kJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J3a//2uFrSc:JfYOX+wTScR/Xzku9LVw4uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks