General

  • Target

    JaffaCakes118_72c42c09b13c3e34e4fb8f9339f6c658a6a0ea6013449287a473b10b9ff611fa

  • Size

    184KB

  • Sample

    241224-mlareavnas

  • MD5

    536086b51163f259acdee4d970b4e185

  • SHA1

    2c7dbee2fa83c340967d3158a789c1f73451e33f

  • SHA256

    72c42c09b13c3e34e4fb8f9339f6c658a6a0ea6013449287a473b10b9ff611fa

  • SHA512

    517325e7e80b4b7875a4fc04071e9bccf161b36689affa713f0e994d5c1aff7bf024df443fd504f670052be8c273aab9840a5add2ee9a8d668726aa1e780f8f2

  • SSDEEP

    3072:lJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J1a//2uFrSc:OfYOX+wTScR/Xzku9LVwGuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_72c42c09b13c3e34e4fb8f9339f6c658a6a0ea6013449287a473b10b9ff611fa

    • Size

      184KB

    • MD5

      536086b51163f259acdee4d970b4e185

    • SHA1

      2c7dbee2fa83c340967d3158a789c1f73451e33f

    • SHA256

      72c42c09b13c3e34e4fb8f9339f6c658a6a0ea6013449287a473b10b9ff611fa

    • SHA512

      517325e7e80b4b7875a4fc04071e9bccf161b36689affa713f0e994d5c1aff7bf024df443fd504f670052be8c273aab9840a5add2ee9a8d668726aa1e780f8f2

    • SSDEEP

      3072:lJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8J1a//2uFrSc:OfYOX+wTScR/Xzku9LVwGuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks