General

  • Target

    JaffaCakes118_ebdaf788f9635aa2b4d6c7b23c1723607bf3b0e8255dea80c8bcdb1e3e410b17

  • Size

    184KB

  • Sample

    241224-k7ldxstlgs

  • MD5

    d8cc3658858602710d4c87cb1da6386d

  • SHA1

    8292b8e894a83f3d5dab46206105833477ac9d7e

  • SHA256

    ebdaf788f9635aa2b4d6c7b23c1723607bf3b0e8255dea80c8bcdb1e3e410b17

  • SHA512

    5590b4bbd4f6cca638f814356829c2397079f1c4895d607c29f570aabb9f49dc56f3936bf7d83b52e9cf23366344a69ca30324ac81aa7da4a4991ef2b0301f38

  • SSDEEP

    3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JQa//2uFrSc:mfYOX+wTScR/Xzku9LVwnuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ebdaf788f9635aa2b4d6c7b23c1723607bf3b0e8255dea80c8bcdb1e3e410b17

    • Size

      184KB

    • MD5

      d8cc3658858602710d4c87cb1da6386d

    • SHA1

      8292b8e894a83f3d5dab46206105833477ac9d7e

    • SHA256

      ebdaf788f9635aa2b4d6c7b23c1723607bf3b0e8255dea80c8bcdb1e3e410b17

    • SHA512

      5590b4bbd4f6cca638f814356829c2397079f1c4895d607c29f570aabb9f49dc56f3936bf7d83b52e9cf23366344a69ca30324ac81aa7da4a4991ef2b0301f38

    • SSDEEP

      3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JQa//2uFrSc:mfYOX+wTScR/Xzku9LVwnuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks