General

  • Target

    JaffaCakes118_e942edf6df868f96a60997f18bd7a2ae849b91775abc0e3ed2530d555ebddb11

  • Size

    184KB

  • Sample

    241224-c5ffwszmhj

  • MD5

    03b2fdb92d48a9fe97169c9bd075ddd6

  • SHA1

    c900c210a6f596b9eac0480770ea6fd20bbeb843

  • SHA256

    e942edf6df868f96a60997f18bd7a2ae849b91775abc0e3ed2530d555ebddb11

  • SHA512

    8b7c437d3a90089c903cd0773f0d300a2716a7db1fdb59acfeaa078793d7c9afe438cc04f80483addb1f1c2a1b6fcb3f63f196b63f67ce528c92bb2c5eba1284

  • SSDEEP

    3072:2JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jma//2uFrSc:/fYOX+wTScR/Xzku9LVwVuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e942edf6df868f96a60997f18bd7a2ae849b91775abc0e3ed2530d555ebddb11

    • Size

      184KB

    • MD5

      03b2fdb92d48a9fe97169c9bd075ddd6

    • SHA1

      c900c210a6f596b9eac0480770ea6fd20bbeb843

    • SHA256

      e942edf6df868f96a60997f18bd7a2ae849b91775abc0e3ed2530d555ebddb11

    • SHA512

      8b7c437d3a90089c903cd0773f0d300a2716a7db1fdb59acfeaa078793d7c9afe438cc04f80483addb1f1c2a1b6fcb3f63f196b63f67ce528c92bb2c5eba1284

    • SSDEEP

      3072:2JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jma//2uFrSc:/fYOX+wTScR/Xzku9LVwVuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks