General

  • Target

    JaffaCakes118_7c6ff6be2cc45e1429a7c348da3cf2dc6a08e36a8a5861f59f0d9a1ce6cf1f91

  • Size

    184KB

  • Sample

    241224-mlrd6avphq

  • MD5

    7951cd441c306356560a775c03e7472a

  • SHA1

    473d0848d7bd0f0db263b1f2874929a23c99f0a5

  • SHA256

    7c6ff6be2cc45e1429a7c348da3cf2dc6a08e36a8a5861f59f0d9a1ce6cf1f91

  • SHA512

    5ac0154429ef57fd1f980abbb0df1561026b20f1b0737e72ec31e22de42613cd59c563be01cc3281ff408a2dec85cf0b0793d75c624d525c6d945e91d2bf753f

  • SSDEEP

    3072:DJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JDa//2uFrSc:ofYOX+wTScR/Xzku9LVwwuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_7c6ff6be2cc45e1429a7c348da3cf2dc6a08e36a8a5861f59f0d9a1ce6cf1f91

    • Size

      184KB

    • MD5

      7951cd441c306356560a775c03e7472a

    • SHA1

      473d0848d7bd0f0db263b1f2874929a23c99f0a5

    • SHA256

      7c6ff6be2cc45e1429a7c348da3cf2dc6a08e36a8a5861f59f0d9a1ce6cf1f91

    • SHA512

      5ac0154429ef57fd1f980abbb0df1561026b20f1b0737e72ec31e22de42613cd59c563be01cc3281ff408a2dec85cf0b0793d75c624d525c6d945e91d2bf753f

    • SSDEEP

      3072:DJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8JDa//2uFrSc:ofYOX+wTScR/Xzku9LVwwuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks