General

  • Target

    JaffaCakes118_e99291b70bc467c3154c55e3b209f5b76e63d08f01c83f98bafd38ea2b05f0f1

  • Size

    184KB

  • Sample

    241226-vbj64a1nfn

  • MD5

    ffffd3001ac9052fc5168491250264e4

  • SHA1

    5b8a3cf325e1ef475d63828e88ef0ab274b52748

  • SHA256

    e99291b70bc467c3154c55e3b209f5b76e63d08f01c83f98bafd38ea2b05f0f1

  • SHA512

    ddb4300e056c12eac1a12239bf7b319991a11b6d4ce82084fe14d557a8c0075340b780992ad45fc9f05a9c367d85053ba574705e199fcf8fe95752920f414fca

  • SSDEEP

    3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao5lzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaonoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e99291b70bc467c3154c55e3b209f5b76e63d08f01c83f98bafd38ea2b05f0f1

    • Size

      184KB

    • MD5

      ffffd3001ac9052fc5168491250264e4

    • SHA1

      5b8a3cf325e1ef475d63828e88ef0ab274b52748

    • SHA256

      e99291b70bc467c3154c55e3b209f5b76e63d08f01c83f98bafd38ea2b05f0f1

    • SHA512

      ddb4300e056c12eac1a12239bf7b319991a11b6d4ce82084fe14d557a8c0075340b780992ad45fc9f05a9c367d85053ba574705e199fcf8fe95752920f414fca

    • SSDEEP

      3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao5lzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaonoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks