General

  • Target

    JaffaCakes118_414187672ca5bde93b8a5b1b38c01f90fec42a6d7017d51dc5e13a17b002de9e

  • Size

    184KB

  • Sample

    241224-cm348synf1

  • MD5

    da089a070ae9fa358d29a40e2993b591

  • SHA1

    6882c62a6a80fad5b2f89b8a7d49642cbfe7f8a4

  • SHA256

    414187672ca5bde93b8a5b1b38c01f90fec42a6d7017d51dc5e13a17b002de9e

  • SHA512

    b8d935a3d9fe2f8d7f15d6c7df9bd10fa01394f1ecf417369a3fec0f0082b7844bfdc10163a17f36c7ffd1be076f1a083853c0f6b4beff54b586a2555b91ed44

  • SSDEEP

    3072:eJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jba//2uFrSc:nfYOX+wTScR/Xzku9LVwYuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_414187672ca5bde93b8a5b1b38c01f90fec42a6d7017d51dc5e13a17b002de9e

    • Size

      184KB

    • MD5

      da089a070ae9fa358d29a40e2993b591

    • SHA1

      6882c62a6a80fad5b2f89b8a7d49642cbfe7f8a4

    • SHA256

      414187672ca5bde93b8a5b1b38c01f90fec42a6d7017d51dc5e13a17b002de9e

    • SHA512

      b8d935a3d9fe2f8d7f15d6c7df9bd10fa01394f1ecf417369a3fec0f0082b7844bfdc10163a17f36c7ffd1be076f1a083853c0f6b4beff54b586a2555b91ed44

    • SSDEEP

      3072:eJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jba//2uFrSc:nfYOX+wTScR/Xzku9LVwYuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks