General

  • Target

    JaffaCakes118_0fd28c30ac3ab63d2cf5c58e2922feebbc44aa0a1ea88c7b4eb6c737bda75faf

  • Size

    184KB

  • Sample

    241224-czn6vazkhl

  • MD5

    f7f9e9a60d396eca849b3a5c35165694

  • SHA1

    5fe2e41969e4048b6684ec0153f6c58da20de7b1

  • SHA256

    0fd28c30ac3ab63d2cf5c58e2922feebbc44aa0a1ea88c7b4eb6c737bda75faf

  • SHA512

    228de74e63d5698c463af2ba9dff4d7fa85f9b623926d85ac8ff0b06b817438d99afaadc38d998b2213c5a8066c5a5d8096f2e303afce06f1544f22c5c2d6322

  • SSDEEP

    3072:8iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaotlzoxss7:8iLVCIT4WK2z1W+CUHZj4Skq/eaojoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0fd28c30ac3ab63d2cf5c58e2922feebbc44aa0a1ea88c7b4eb6c737bda75faf

    • Size

      184KB

    • MD5

      f7f9e9a60d396eca849b3a5c35165694

    • SHA1

      5fe2e41969e4048b6684ec0153f6c58da20de7b1

    • SHA256

      0fd28c30ac3ab63d2cf5c58e2922feebbc44aa0a1ea88c7b4eb6c737bda75faf

    • SHA512

      228de74e63d5698c463af2ba9dff4d7fa85f9b623926d85ac8ff0b06b817438d99afaadc38d998b2213c5a8066c5a5d8096f2e303afce06f1544f22c5c2d6322

    • SSDEEP

      3072:8iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaotlzoxss7:8iLVCIT4WK2z1W+CUHZj4Skq/eaojoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks