General

  • Target

    JaffaCakes118_da79b56faa9b3c09bb70c3341bb2c1ee1f3e7de5b04b74c28e04e669b1f5ac1b

  • Size

    184KB

  • Sample

    241224-yy6kdswnem

  • MD5

    54868f602bc44120c36f64e31e4a72b8

  • SHA1

    e2282128bbe8caef9708ef5359f95c143b8cb6f1

  • SHA256

    da79b56faa9b3c09bb70c3341bb2c1ee1f3e7de5b04b74c28e04e669b1f5ac1b

  • SHA512

    894249d90c0b2ffc89c02eb64bd4fe1deb6bed65a731442608221f74e99955655c6f210c14239f6ea4e180ec23ed789262d4d617bba0638f6fc63548a2aaef9e

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao2lzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaokoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_da79b56faa9b3c09bb70c3341bb2c1ee1f3e7de5b04b74c28e04e669b1f5ac1b

    • Size

      184KB

    • MD5

      54868f602bc44120c36f64e31e4a72b8

    • SHA1

      e2282128bbe8caef9708ef5359f95c143b8cb6f1

    • SHA256

      da79b56faa9b3c09bb70c3341bb2c1ee1f3e7de5b04b74c28e04e669b1f5ac1b

    • SHA512

      894249d90c0b2ffc89c02eb64bd4fe1deb6bed65a731442608221f74e99955655c6f210c14239f6ea4e180ec23ed789262d4d617bba0638f6fc63548a2aaef9e

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao2lzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaokoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks