General

  • Target

    JaffaCakes118_f560ba6e2df33b360161fa75ae09f2b9efec2cc74feb8b7bfd9299a3c9aa3c9b

  • Size

    184KB

  • Sample

    241225-q93c4svldr

  • MD5

    c6fc39aeebf319636cfd46bae7f04d9c

  • SHA1

    dcd86f5f04a743e15f3c86f6c7c485ab7dedd154

  • SHA256

    f560ba6e2df33b360161fa75ae09f2b9efec2cc74feb8b7bfd9299a3c9aa3c9b

  • SHA512

    8b4d8b5b43c258111fb66d020da7a61f54a243c3ee86cf0b26dbcd7c0a967e60e6f3ac761d3cf9690e7f6d8f0be40557eb26fc337e1e33ba67eeb3d9bc4ff74f

  • SSDEEP

    3072:biLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoVlzoxss7:biLVCIT4WK2z1W+CUHZj4Skq/eao7oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f560ba6e2df33b360161fa75ae09f2b9efec2cc74feb8b7bfd9299a3c9aa3c9b

    • Size

      184KB

    • MD5

      c6fc39aeebf319636cfd46bae7f04d9c

    • SHA1

      dcd86f5f04a743e15f3c86f6c7c485ab7dedd154

    • SHA256

      f560ba6e2df33b360161fa75ae09f2b9efec2cc74feb8b7bfd9299a3c9aa3c9b

    • SHA512

      8b4d8b5b43c258111fb66d020da7a61f54a243c3ee86cf0b26dbcd7c0a967e60e6f3ac761d3cf9690e7f6d8f0be40557eb26fc337e1e33ba67eeb3d9bc4ff74f

    • SSDEEP

      3072:biLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoVlzoxss7:biLVCIT4WK2z1W+CUHZj4Skq/eao7oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks