General

  • Target

    JaffaCakes118_2e17b0c33a7aa0cdf48bd6ac96efd77a2207956462fa74c59a63ed678d7beed8

  • Size

    164KB

  • Sample

    241224-tl83ja1rbl

  • MD5

    14459531c55a638796eecb79430274f1

  • SHA1

    7d92d4e6bc46cca855db5fd7409ce332e285b2c6

  • SHA256

    2e17b0c33a7aa0cdf48bd6ac96efd77a2207956462fa74c59a63ed678d7beed8

  • SHA512

    aaad4ea7394e0f10161411ff8354a124328f2ced9de97a5da7ee924bee1050e591b0a1b9f937303600ea80c6e4ab6a16cb2c8cd81e5c911a3d1d013c02b79101

  • SSDEEP

    3072:cBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:cBefiv/12+2A1AIpFzxCtNjHSoPm11J

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.123.40.54:443

82.209.17.209:8172

180.250.21.2:13721

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_2e17b0c33a7aa0cdf48bd6ac96efd77a2207956462fa74c59a63ed678d7beed8

    • Size

      164KB

    • MD5

      14459531c55a638796eecb79430274f1

    • SHA1

      7d92d4e6bc46cca855db5fd7409ce332e285b2c6

    • SHA256

      2e17b0c33a7aa0cdf48bd6ac96efd77a2207956462fa74c59a63ed678d7beed8

    • SHA512

      aaad4ea7394e0f10161411ff8354a124328f2ced9de97a5da7ee924bee1050e591b0a1b9f937303600ea80c6e4ab6a16cb2c8cd81e5c911a3d1d013c02b79101

    • SSDEEP

      3072:cBefihU8fQ2Sob/xg+eNV1A1I3aiI8i3GdVAzuECtNjP3/3ioP7y11a0E:cBefiv/12+2A1AIpFzxCtNjHSoPm11J

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks