General

  • Target

    JaffaCakes118_feff88074e05bdde268cd96478e86a321728bf2b9810cc3d9de132562ee7fc37

  • Size

    184KB

  • Sample

    241224-lwwk7avkcj

  • MD5

    3f4f947a7bb4bf32ea01998240334aab

  • SHA1

    cd696270b20c39aa9e65ff71fec9c7128bd52514

  • SHA256

    feff88074e05bdde268cd96478e86a321728bf2b9810cc3d9de132562ee7fc37

  • SHA512

    c6e254eda3db4bf8442403b70cd522abab8b7537701a05ce186560194271e3194d34cc21c00195fd759d5a021d966b4536dbc6f225e8a47ee145916e3d0ac98d

  • SSDEEP

    3072:LJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JTa//2uFrSc:QfYOX+wTScR/Xzku9LVw8uG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_feff88074e05bdde268cd96478e86a321728bf2b9810cc3d9de132562ee7fc37

    • Size

      184KB

    • MD5

      3f4f947a7bb4bf32ea01998240334aab

    • SHA1

      cd696270b20c39aa9e65ff71fec9c7128bd52514

    • SHA256

      feff88074e05bdde268cd96478e86a321728bf2b9810cc3d9de132562ee7fc37

    • SHA512

      c6e254eda3db4bf8442403b70cd522abab8b7537701a05ce186560194271e3194d34cc21c00195fd759d5a021d966b4536dbc6f225e8a47ee145916e3d0ac98d

    • SSDEEP

      3072:LJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JTa//2uFrSc:QfYOX+wTScR/Xzku9LVw8uG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks