General

  • Target

    JaffaCakes118_d368e10b29b1582b6da504cb778035a4319865b9e5279b1a9f9dfc53d373c2ed

  • Size

    184KB

  • Sample

    241225-cn4r6atrdv

  • MD5

    c4ee46c20d435dad8fd5c5bad323db04

  • SHA1

    2189562ed58d51db8a2dd681e9b163376ec956ce

  • SHA256

    d368e10b29b1582b6da504cb778035a4319865b9e5279b1a9f9dfc53d373c2ed

  • SHA512

    9207ba5a5efb2db77c57fe7a278b07802d6da8bf04d060f2fa53c46165f370ff2d04966c1a5a2200cbc16c9c12b3c7535d45961ae34364d5cee03cdc07040619

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoXlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoloC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d368e10b29b1582b6da504cb778035a4319865b9e5279b1a9f9dfc53d373c2ed

    • Size

      184KB

    • MD5

      c4ee46c20d435dad8fd5c5bad323db04

    • SHA1

      2189562ed58d51db8a2dd681e9b163376ec956ce

    • SHA256

      d368e10b29b1582b6da504cb778035a4319865b9e5279b1a9f9dfc53d373c2ed

    • SHA512

      9207ba5a5efb2db77c57fe7a278b07802d6da8bf04d060f2fa53c46165f370ff2d04966c1a5a2200cbc16c9c12b3c7535d45961ae34364d5cee03cdc07040619

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoXlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoloC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks