General

  • Target

    JaffaCakes118_261bf3d7b08e8edaa8fc6e3af52eca13402cfa7e17d80c0fbfec8441bbc9d80c

  • Size

    184KB

  • Sample

    241224-l8qwgavkdw

  • MD5

    e57f382a6f41ddf025d17d68deb17af2

  • SHA1

    e7ca65bd6c4dbbc05ded6fb8f9528715d82a2766

  • SHA256

    261bf3d7b08e8edaa8fc6e3af52eca13402cfa7e17d80c0fbfec8441bbc9d80c

  • SHA512

    1af0660d80fe8150dcd7f9ca78eed510932e992938866343c940e13371cf14a009a003a955a59de92dfbf033924a53771659f5c84ae3b23d21aab99f6e9d0bc5

  • SSDEEP

    3072:3iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoylzoxss7:3iLVCIT4WK2z1W+CUHZj4Skq/eao4oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_261bf3d7b08e8edaa8fc6e3af52eca13402cfa7e17d80c0fbfec8441bbc9d80c

    • Size

      184KB

    • MD5

      e57f382a6f41ddf025d17d68deb17af2

    • SHA1

      e7ca65bd6c4dbbc05ded6fb8f9528715d82a2766

    • SHA256

      261bf3d7b08e8edaa8fc6e3af52eca13402cfa7e17d80c0fbfec8441bbc9d80c

    • SHA512

      1af0660d80fe8150dcd7f9ca78eed510932e992938866343c940e13371cf14a009a003a955a59de92dfbf033924a53771659f5c84ae3b23d21aab99f6e9d0bc5

    • SSDEEP

      3072:3iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoylzoxss7:3iLVCIT4WK2z1W+CUHZj4Skq/eao4oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks