General

  • Target

    JaffaCakes118_98634e48e052881d55c149ce4931d2b9a11d38f82b0c06983f52d510d487478e

  • Size

    184KB

  • Sample

    241225-yeazdavmhj

  • MD5

    dba16a2913d312bbf5c942d6714cc6c5

  • SHA1

    4be39d9bc07d6a531411403ff85d1caf5bbb45b8

  • SHA256

    98634e48e052881d55c149ce4931d2b9a11d38f82b0c06983f52d510d487478e

  • SHA512

    34ab273ede9dcbce80799e7d17b19cc741ee015999663a891c003d0376f4ed3396b5c18d659ba0293d07f140e8754f2838cb0d7c040700e12d157bd90881cce4

  • SSDEEP

    3072:ViLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoYlzoxss7:ViLVCIT4WK2z1W+CUHZj4Skq/eaoGoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_98634e48e052881d55c149ce4931d2b9a11d38f82b0c06983f52d510d487478e

    • Size

      184KB

    • MD5

      dba16a2913d312bbf5c942d6714cc6c5

    • SHA1

      4be39d9bc07d6a531411403ff85d1caf5bbb45b8

    • SHA256

      98634e48e052881d55c149ce4931d2b9a11d38f82b0c06983f52d510d487478e

    • SHA512

      34ab273ede9dcbce80799e7d17b19cc741ee015999663a891c003d0376f4ed3396b5c18d659ba0293d07f140e8754f2838cb0d7c040700e12d157bd90881cce4

    • SSDEEP

      3072:ViLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoYlzoxss7:ViLVCIT4WK2z1W+CUHZj4Skq/eaoGoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks