General

  • Target

    JaffaCakes118_1dbc34fc510152f569e7d347c3706e8048e1695cfc262a1f4d0cddd4db4b2d9d

  • Size

    184KB

  • Sample

    241226-3hlx9svmbv

  • MD5

    c2577659a97967c4be5da798373be6a1

  • SHA1

    44ebf4d7b28a6d8478ec0097a4a64e07c0c3cd02

  • SHA256

    1dbc34fc510152f569e7d347c3706e8048e1695cfc262a1f4d0cddd4db4b2d9d

  • SHA512

    47ae4361c189e5c5df5136e7c72315a1ef9cff5c9ec0d95ff3cef726ee731840748323db850d2a63fbe17fd74910469e8e5c06f1d7a0a3013830814439fc98a5

  • SSDEEP

    3072:yiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaomlzoxss7:yiLVCIT4WK2z1W+CUHZj4Skq/eao0oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1dbc34fc510152f569e7d347c3706e8048e1695cfc262a1f4d0cddd4db4b2d9d

    • Size

      184KB

    • MD5

      c2577659a97967c4be5da798373be6a1

    • SHA1

      44ebf4d7b28a6d8478ec0097a4a64e07c0c3cd02

    • SHA256

      1dbc34fc510152f569e7d347c3706e8048e1695cfc262a1f4d0cddd4db4b2d9d

    • SHA512

      47ae4361c189e5c5df5136e7c72315a1ef9cff5c9ec0d95ff3cef726ee731840748323db850d2a63fbe17fd74910469e8e5c06f1d7a0a3013830814439fc98a5

    • SSDEEP

      3072:yiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaomlzoxss7:yiLVCIT4WK2z1W+CUHZj4Skq/eao0oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks