General

  • Target

    JaffaCakes118_c3fb25168561096d8bb96f40b6c9693224d3908a96a9325e5b55d11dc5483039

  • Size

    184KB

  • Sample

    241225-ac1j9a1qbj

  • MD5

    6c7032e8f5ec9dd49a9521b1e0638462

  • SHA1

    a2c678b83ab40e3c8bab3be3b6450956a469aa3c

  • SHA256

    c3fb25168561096d8bb96f40b6c9693224d3908a96a9325e5b55d11dc5483039

  • SHA512

    a2f0319d6ced46302e259610eca778dad6750d4eddb1b497f4ce53d632fb18fe5812f80cf17cbe4b758479029947da827b9d481bfc9aa7398f8daa7cedf875fa

  • SSDEEP

    3072:7iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoMlzoxss7:7iLVCIT4WK2z1W+CUHZj4Skq/eaoyoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c3fb25168561096d8bb96f40b6c9693224d3908a96a9325e5b55d11dc5483039

    • Size

      184KB

    • MD5

      6c7032e8f5ec9dd49a9521b1e0638462

    • SHA1

      a2c678b83ab40e3c8bab3be3b6450956a469aa3c

    • SHA256

      c3fb25168561096d8bb96f40b6c9693224d3908a96a9325e5b55d11dc5483039

    • SHA512

      a2f0319d6ced46302e259610eca778dad6750d4eddb1b497f4ce53d632fb18fe5812f80cf17cbe4b758479029947da827b9d481bfc9aa7398f8daa7cedf875fa

    • SSDEEP

      3072:7iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoMlzoxss7:7iLVCIT4WK2z1W+CUHZj4Skq/eaoyoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks