General

  • Target

    JaffaCakes118_f3c76fe76ea95754964e8c980b05f5e72acc9382034b5d62235fb572cb271c11

  • Size

    184KB

  • Sample

    241225-f14vgaynfv

  • MD5

    346d18ed8aa1c15115b8b1ba8b3691b5

  • SHA1

    ac2cb0fe68d7176564afa85a11fd01e85813afb0

  • SHA256

    f3c76fe76ea95754964e8c980b05f5e72acc9382034b5d62235fb572cb271c11

  • SHA512

    4b01e8a0e079a017fc46b145e8114997e037493d707a99d74add906faacaf15976aa267b1f64d4e07d0a109a208651b499be5709e2cc94feea0f54806a344d54

  • SSDEEP

    3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoulzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaosoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f3c76fe76ea95754964e8c980b05f5e72acc9382034b5d62235fb572cb271c11

    • Size

      184KB

    • MD5

      346d18ed8aa1c15115b8b1ba8b3691b5

    • SHA1

      ac2cb0fe68d7176564afa85a11fd01e85813afb0

    • SHA256

      f3c76fe76ea95754964e8c980b05f5e72acc9382034b5d62235fb572cb271c11

    • SHA512

      4b01e8a0e079a017fc46b145e8114997e037493d707a99d74add906faacaf15976aa267b1f64d4e07d0a109a208651b499be5709e2cc94feea0f54806a344d54

    • SSDEEP

      3072:1iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoulzoxss7:1iLVCIT4WK2z1W+CUHZj4Skq/eaosoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks