General

  • Target

    JaffaCakes118_b50f34159ef3c13a2d3bd9fe9ee5722b32d29076e43372357053b8df9ae158a5

  • Size

    184KB

  • Sample

    241224-r49exazldx

  • MD5

    14a0297cfcbc568c074f7c5f8958c0c7

  • SHA1

    1e182cec8a4eada97e2a94224197e2cd951ea23b

  • SHA256

    b50f34159ef3c13a2d3bd9fe9ee5722b32d29076e43372357053b8df9ae158a5

  • SHA512

    2d4d9d8ecb45938e5813a5c050fea2149b52d0fb23ed227a0aca69788e740136c81fbd5bc09528da18e88b77a954bb38a0c9651986faf7ae546b1ee7d88dedc6

  • SSDEEP

    3072:/iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:/iLVCIT4WK2z1W+CUHZj4Skq/eaoYoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b50f34159ef3c13a2d3bd9fe9ee5722b32d29076e43372357053b8df9ae158a5

    • Size

      184KB

    • MD5

      14a0297cfcbc568c074f7c5f8958c0c7

    • SHA1

      1e182cec8a4eada97e2a94224197e2cd951ea23b

    • SHA256

      b50f34159ef3c13a2d3bd9fe9ee5722b32d29076e43372357053b8df9ae158a5

    • SHA512

      2d4d9d8ecb45938e5813a5c050fea2149b52d0fb23ed227a0aca69788e740136c81fbd5bc09528da18e88b77a954bb38a0c9651986faf7ae546b1ee7d88dedc6

    • SSDEEP

      3072:/iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSlzoxss7:/iLVCIT4WK2z1W+CUHZj4Skq/eaoYoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks