General

  • Target

    JaffaCakes118_5139767b65efe98a8c98bcd89cf51d14e7b95040600b460dd07f525f19a9f4cb

  • Size

    184KB

  • Sample

    241224-memsdsvnen

  • MD5

    e4a7dc457b51daba34b4d380734ff525

  • SHA1

    980257b95df1f16ec3d61ad19c79dd7ac961e6ac

  • SHA256

    5139767b65efe98a8c98bcd89cf51d14e7b95040600b460dd07f525f19a9f4cb

  • SHA512

    4408cb931d00980e436891b16527e40d2126aed21b9f19e6caaa96dded3d74d230fd772f5219979ad4f69c75082a4683a4f8aa6700cbde6e75d6116aa2cf4baa

  • SSDEEP

    3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jca//2uFrSc:mfYOX+wTScR/Xzku9LVwruG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_5139767b65efe98a8c98bcd89cf51d14e7b95040600b460dd07f525f19a9f4cb

    • Size

      184KB

    • MD5

      e4a7dc457b51daba34b4d380734ff525

    • SHA1

      980257b95df1f16ec3d61ad19c79dd7ac961e6ac

    • SHA256

      5139767b65efe98a8c98bcd89cf51d14e7b95040600b460dd07f525f19a9f4cb

    • SHA512

      4408cb931d00980e436891b16527e40d2126aed21b9f19e6caaa96dded3d74d230fd772f5219979ad4f69c75082a4683a4f8aa6700cbde6e75d6116aa2cf4baa

    • SSDEEP

      3072:dJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jca//2uFrSc:mfYOX+wTScR/Xzku9LVwruG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks