General

  • Target

    JaffaCakes118_a8dc671e33aab06b04c0bdb217bbe22efb9264eae213021e2d24c8bcab0ce323

  • Size

    184KB

  • Sample

    241224-c6nhwszndq

  • MD5

    90446496ef9c16dfd8f717c1372ef781

  • SHA1

    b84a201e467e4fd5b63784cbc9b1707c42df15dc

  • SHA256

    a8dc671e33aab06b04c0bdb217bbe22efb9264eae213021e2d24c8bcab0ce323

  • SHA512

    b8b2160fc26f5fa35c17dd518dc274e9a549aeafaba5611e00eacdc907ab48b0213db1f7f49d2489e5a097692e72a73fda67aabe69b4ea366986c1622aabb0fa

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoolzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eao2oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a8dc671e33aab06b04c0bdb217bbe22efb9264eae213021e2d24c8bcab0ce323

    • Size

      184KB

    • MD5

      90446496ef9c16dfd8f717c1372ef781

    • SHA1

      b84a201e467e4fd5b63784cbc9b1707c42df15dc

    • SHA256

      a8dc671e33aab06b04c0bdb217bbe22efb9264eae213021e2d24c8bcab0ce323

    • SHA512

      b8b2160fc26f5fa35c17dd518dc274e9a549aeafaba5611e00eacdc907ab48b0213db1f7f49d2489e5a097692e72a73fda67aabe69b4ea366986c1622aabb0fa

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoolzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eao2oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks