General

  • Target

    JaffaCakes118_914c954bcc5904bda86c2924f3a480824e0ef9f3d3fe2becb7811bc53bd7d7b5

  • Size

    184KB

  • Sample

    241225-amncns1qd1

  • MD5

    9f58dafc3f1197461525ca1559551c70

  • SHA1

    4e9af6f519769d0d49837287bf1db12c72fe50b6

  • SHA256

    914c954bcc5904bda86c2924f3a480824e0ef9f3d3fe2becb7811bc53bd7d7b5

  • SHA512

    b7ceaa452593eb716a2a29f3067daa43ba123fd179c5b0fd5b6ef1e103123fc0a2410207d8a1649de6d7ac0ca363e4a7c72cc1bd2bf228eedd3e6867a9cd7455

  • SSDEEP

    3072:+iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoalzoxss7:+iLVCIT4WK2z1W+CUHZj4Skq/eaowoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_914c954bcc5904bda86c2924f3a480824e0ef9f3d3fe2becb7811bc53bd7d7b5

    • Size

      184KB

    • MD5

      9f58dafc3f1197461525ca1559551c70

    • SHA1

      4e9af6f519769d0d49837287bf1db12c72fe50b6

    • SHA256

      914c954bcc5904bda86c2924f3a480824e0ef9f3d3fe2becb7811bc53bd7d7b5

    • SHA512

      b7ceaa452593eb716a2a29f3067daa43ba123fd179c5b0fd5b6ef1e103123fc0a2410207d8a1649de6d7ac0ca363e4a7c72cc1bd2bf228eedd3e6867a9cd7455

    • SSDEEP

      3072:+iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoalzoxss7:+iLVCIT4WK2z1W+CUHZj4Skq/eaowoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks