General

  • Target

    JaffaCakes118_6bef8c444ca68d323d48f855854fd8735fc62bd7b61275ca0b04eaa990ab44b6

  • Size

    184KB

  • Sample

    241225-qnkk6stqcq

  • MD5

    3738287fffff3d510f2c60635afc2b29

  • SHA1

    404a9d21500f36f1acd9a7a1f2908814bc80506d

  • SHA256

    6bef8c444ca68d323d48f855854fd8735fc62bd7b61275ca0b04eaa990ab44b6

  • SHA512

    d4ac777f18c913d5844b7b4370724e2e9c772edd60b0462102ef4312815e4ccab0e4ac852b8efbe3bad15ff72bfd234a1481687ddd153ca4ad5b912c60f099e9

  • SSDEEP

    3072:kiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoUlzoxss7:kiLVCIT4WK2z1W+CUHZj4Skq/eaoqoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6bef8c444ca68d323d48f855854fd8735fc62bd7b61275ca0b04eaa990ab44b6

    • Size

      184KB

    • MD5

      3738287fffff3d510f2c60635afc2b29

    • SHA1

      404a9d21500f36f1acd9a7a1f2908814bc80506d

    • SHA256

      6bef8c444ca68d323d48f855854fd8735fc62bd7b61275ca0b04eaa990ab44b6

    • SHA512

      d4ac777f18c913d5844b7b4370724e2e9c772edd60b0462102ef4312815e4ccab0e4ac852b8efbe3bad15ff72bfd234a1481687ddd153ca4ad5b912c60f099e9

    • SSDEEP

      3072:kiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoUlzoxss7:kiLVCIT4WK2z1W+CUHZj4Skq/eaoqoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks