General

  • Target

    JaffaCakes118_30e260415d1d7187b0f2c3d56bad9b8624974e61a20cd33379ee5b40c64b51e5

  • Size

    184KB

  • Sample

    241225-ckkj4svjak

  • MD5

    c0d4d179f45ca1d40c819d26240e01fd

  • SHA1

    406b315fbcc26f4bf92658ab7146e3b8ea7c06c1

  • SHA256

    30e260415d1d7187b0f2c3d56bad9b8624974e61a20cd33379ee5b40c64b51e5

  • SHA512

    5d16144f3e9358b4b75766013c5b5f72c3dd4b0aebbb7529da2946cc866e31fd9844a8fac97bdf475f38750f769b5b3e9b7f6b6e0f89f0ea908196b94838150f

  • SSDEEP

    3072:7iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaollzoxss7:7iLVCIT4WK2z1W+CUHZj4Skq/eaoroC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_30e260415d1d7187b0f2c3d56bad9b8624974e61a20cd33379ee5b40c64b51e5

    • Size

      184KB

    • MD5

      c0d4d179f45ca1d40c819d26240e01fd

    • SHA1

      406b315fbcc26f4bf92658ab7146e3b8ea7c06c1

    • SHA256

      30e260415d1d7187b0f2c3d56bad9b8624974e61a20cd33379ee5b40c64b51e5

    • SHA512

      5d16144f3e9358b4b75766013c5b5f72c3dd4b0aebbb7529da2946cc866e31fd9844a8fac97bdf475f38750f769b5b3e9b7f6b6e0f89f0ea908196b94838150f

    • SSDEEP

      3072:7iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaollzoxss7:7iLVCIT4WK2z1W+CUHZj4Skq/eaoroC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks