General

  • Target

    JaffaCakes118_e9c20db55be68eaf78e04c77ed0d8c4e1d8512dd3c776109c7a48fb9833bc96e

  • Size

    184KB

  • Sample

    241224-ln16pstren

  • MD5

    fa02fcd468fc037e9e3083435df1db7d

  • SHA1

    5afeefaa77d02cf3042090c864bb88fcab8047a5

  • SHA256

    e9c20db55be68eaf78e04c77ed0d8c4e1d8512dd3c776109c7a48fb9833bc96e

  • SHA512

    422cb76ee1f7bd05789fe9744646fd9ec56d9284b85095cb53071b17bff1d1a1d576f61a92d72497ff09e9c7bd5578636bfabb9ab907a0eddb0da2073f0e1234

  • SSDEEP

    3072:+JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JTa//2uFrSc:HfYOX+wTScR/Xzku9LVwIuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e9c20db55be68eaf78e04c77ed0d8c4e1d8512dd3c776109c7a48fb9833bc96e

    • Size

      184KB

    • MD5

      fa02fcd468fc037e9e3083435df1db7d

    • SHA1

      5afeefaa77d02cf3042090c864bb88fcab8047a5

    • SHA256

      e9c20db55be68eaf78e04c77ed0d8c4e1d8512dd3c776109c7a48fb9833bc96e

    • SHA512

      422cb76ee1f7bd05789fe9744646fd9ec56d9284b85095cb53071b17bff1d1a1d576f61a92d72497ff09e9c7bd5578636bfabb9ab907a0eddb0da2073f0e1234

    • SSDEEP

      3072:+JQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JTa//2uFrSc:HfYOX+wTScR/Xzku9LVwIuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks