General

  • Target

    JaffaCakes118_879a587d8db7ce51b35ff444198df302e6ba97a5eafecc4a3b49c059eeb2fee2

  • Size

    184KB

  • Sample

    241226-13jmjasqbl

  • MD5

    f1c0c8f817b0afa928332805d71433f4

  • SHA1

    bdc70a72292c0e9865dbc2e374063522cb7486b3

  • SHA256

    879a587d8db7ce51b35ff444198df302e6ba97a5eafecc4a3b49c059eeb2fee2

  • SHA512

    4e1a4c66d000f0135ae62648109af34a918d57fbe6d2797f497708a0e8b12eaecf9aad715f291a6e61b976b136e6fc240eb251386624d06aae8f4f70704d848b

  • SSDEEP

    3072:WiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoElzoxss7:WiLVCIT4WK2z1W+CUHZj4Skq/eao6oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_879a587d8db7ce51b35ff444198df302e6ba97a5eafecc4a3b49c059eeb2fee2

    • Size

      184KB

    • MD5

      f1c0c8f817b0afa928332805d71433f4

    • SHA1

      bdc70a72292c0e9865dbc2e374063522cb7486b3

    • SHA256

      879a587d8db7ce51b35ff444198df302e6ba97a5eafecc4a3b49c059eeb2fee2

    • SHA512

      4e1a4c66d000f0135ae62648109af34a918d57fbe6d2797f497708a0e8b12eaecf9aad715f291a6e61b976b136e6fc240eb251386624d06aae8f4f70704d848b

    • SSDEEP

      3072:WiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoElzoxss7:WiLVCIT4WK2z1W+CUHZj4Skq/eao6oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks