General

  • Target

    JaffaCakes118_df10f30fca3acea50b649ebb22064dbf70c7a964a0c634ce48f512b1cbcaab61

  • Size

    184KB

  • Sample

    241225-ep7ljsxmcz

  • MD5

    4411ad1781984134ee58f642b86852e6

  • SHA1

    57bff90fc756140344b8dcec4a9da49a5c14323f

  • SHA256

    df10f30fca3acea50b649ebb22064dbf70c7a964a0c634ce48f512b1cbcaab61

  • SHA512

    57d60d01705e206650d69001f96922615070bf32bcf8b8468828cbbab6bf73725320578677a7751a1e9fb5fd5e6be099c7bb69887b5134f2427fffc0a69fa20a

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSGlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoSUoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_df10f30fca3acea50b649ebb22064dbf70c7a964a0c634ce48f512b1cbcaab61

    • Size

      184KB

    • MD5

      4411ad1781984134ee58f642b86852e6

    • SHA1

      57bff90fc756140344b8dcec4a9da49a5c14323f

    • SHA256

      df10f30fca3acea50b649ebb22064dbf70c7a964a0c634ce48f512b1cbcaab61

    • SHA512

      57d60d01705e206650d69001f96922615070bf32bcf8b8468828cbbab6bf73725320578677a7751a1e9fb5fd5e6be099c7bb69887b5134f2427fffc0a69fa20a

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoSGlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoSUoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks