General

  • Target

    JaffaCakes118_cecc1f77576590c3378db29540e9ad9efa6573ea624d70654e570d48bebfeaee

  • Size

    184KB

  • Sample

    241225-a6ybzssmct

  • MD5

    bfd6ab4ab2986f3a41e327b296eb5488

  • SHA1

    20d5f28fc737774c603895b08cb8ba95015bf676

  • SHA256

    cecc1f77576590c3378db29540e9ad9efa6573ea624d70654e570d48bebfeaee

  • SHA512

    4f14e22844c039162474f0cfaf35c133b6313fc08657a268b20710aad7f9cfd0cc3940b2fc39a312a85b2a68327d10f91b23a1282655b9f6fe94cf8c44bc7c20

  • SSDEEP

    3072:CiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoflzoxss7:CiLVCIT4WK2z1W+CUHZj4Skq/eao9oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cecc1f77576590c3378db29540e9ad9efa6573ea624d70654e570d48bebfeaee

    • Size

      184KB

    • MD5

      bfd6ab4ab2986f3a41e327b296eb5488

    • SHA1

      20d5f28fc737774c603895b08cb8ba95015bf676

    • SHA256

      cecc1f77576590c3378db29540e9ad9efa6573ea624d70654e570d48bebfeaee

    • SHA512

      4f14e22844c039162474f0cfaf35c133b6313fc08657a268b20710aad7f9cfd0cc3940b2fc39a312a85b2a68327d10f91b23a1282655b9f6fe94cf8c44bc7c20

    • SSDEEP

      3072:CiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoflzoxss7:CiLVCIT4WK2z1W+CUHZj4Skq/eao9oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks