General

  • Target

    JaffaCakes118_db404580850bf3da9de99da504bac02a37db9d6cd0b32175c52315f8d730bf3b

  • Size

    184KB

  • Sample

    241224-dqy55a1ken

  • MD5

    a852b3311f75863d575512a1339fad00

  • SHA1

    ab546e44dca970922e63e8c258179adbc20686b4

  • SHA256

    db404580850bf3da9de99da504bac02a37db9d6cd0b32175c52315f8d730bf3b

  • SHA512

    7c3b6456a79a8e1ecfa6fb15177483edc911ea46ca2674871724c13a708562f65a8bda46a8c7db33da2e4a9919756332118f46ed53dd75267354d7e40fe6c646

  • SSDEEP

    3072:PJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JJa//2uFrSc:cfYOX+wTScR/Xzku9LVwuuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_db404580850bf3da9de99da504bac02a37db9d6cd0b32175c52315f8d730bf3b

    • Size

      184KB

    • MD5

      a852b3311f75863d575512a1339fad00

    • SHA1

      ab546e44dca970922e63e8c258179adbc20686b4

    • SHA256

      db404580850bf3da9de99da504bac02a37db9d6cd0b32175c52315f8d730bf3b

    • SHA512

      7c3b6456a79a8e1ecfa6fb15177483edc911ea46ca2674871724c13a708562f65a8bda46a8c7db33da2e4a9919756332118f46ed53dd75267354d7e40fe6c646

    • SSDEEP

      3072:PJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JJa//2uFrSc:cfYOX+wTScR/Xzku9LVwuuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks