General

  • Target

    JaffaCakes118_8baf363c7a058700d9ff275aedb5df8ff0aa7d198683eeb2e16c82d4bc49aea7

  • Size

    184KB

  • Sample

    241224-l8hj4avkdt

  • MD5

    80568a1d654889dc1f984131db282b3c

  • SHA1

    f4fcd38a16f669fd95cb3ad6ed489227ee8d95f4

  • SHA256

    8baf363c7a058700d9ff275aedb5df8ff0aa7d198683eeb2e16c82d4bc49aea7

  • SHA512

    e537c0174a10964f4e4e679bb3c89f40c02e16963112e344d0a7735f54fe793236a358143a3cef5ac3025079853ca1ea991fe58dd261961a60fce3781ce85569

  • SSDEEP

    3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao/lzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eaodoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_8baf363c7a058700d9ff275aedb5df8ff0aa7d198683eeb2e16c82d4bc49aea7

    • Size

      184KB

    • MD5

      80568a1d654889dc1f984131db282b3c

    • SHA1

      f4fcd38a16f669fd95cb3ad6ed489227ee8d95f4

    • SHA256

      8baf363c7a058700d9ff275aedb5df8ff0aa7d198683eeb2e16c82d4bc49aea7

    • SHA512

      e537c0174a10964f4e4e679bb3c89f40c02e16963112e344d0a7735f54fe793236a358143a3cef5ac3025079853ca1ea991fe58dd261961a60fce3781ce85569

    • SSDEEP

      3072:HiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao/lzoxss7:HiLVCIT4WK2z1W+CUHZj4Skq/eaodoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks