General

  • Target

    JaffaCakes118_ac38419f6ff2f4a7e1d3c6876bc33289b5a99c5dd82f976a8a7bdf3d4df2c86b

  • Size

    184KB

  • Sample

    241225-sb4vdswjfw

  • MD5

    19e5c47ca14726002285b1a7f0ab1ef0

  • SHA1

    8eb8eefaef9cb6ffa9bbfb9780287e422b72250a

  • SHA256

    ac38419f6ff2f4a7e1d3c6876bc33289b5a99c5dd82f976a8a7bdf3d4df2c86b

  • SHA512

    f35d6a6b3e7568d108ada50d326cf7b3c1990e039c34dc5dc9e47506a36c48623ef4b0896df7a75c22dbe54ec220db8fe218fb268a32cc28c5d8ce90c36e08f5

  • SSDEEP

    3072:tiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaorlzoxss7:tiLVCIT4WK2z1W+CUHZj4Skq/eaoRoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ac38419f6ff2f4a7e1d3c6876bc33289b5a99c5dd82f976a8a7bdf3d4df2c86b

    • Size

      184KB

    • MD5

      19e5c47ca14726002285b1a7f0ab1ef0

    • SHA1

      8eb8eefaef9cb6ffa9bbfb9780287e422b72250a

    • SHA256

      ac38419f6ff2f4a7e1d3c6876bc33289b5a99c5dd82f976a8a7bdf3d4df2c86b

    • SHA512

      f35d6a6b3e7568d108ada50d326cf7b3c1990e039c34dc5dc9e47506a36c48623ef4b0896df7a75c22dbe54ec220db8fe218fb268a32cc28c5d8ce90c36e08f5

    • SSDEEP

      3072:tiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaorlzoxss7:tiLVCIT4WK2z1W+CUHZj4Skq/eaoRoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks