General

  • Target

    JaffaCakes118_49ecf7949f91f01b706a91c04a19ff321bcf5482b9a7d4c9dd5f503abcd87920

  • Size

    184KB

  • Sample

    241226-wxv16atrep

  • MD5

    828fbc8031fc5df104b481eac667d3f8

  • SHA1

    a5f626aa3fd83fd64ea43508d7f0d7d3e6db9a92

  • SHA256

    49ecf7949f91f01b706a91c04a19ff321bcf5482b9a7d4c9dd5f503abcd87920

  • SHA512

    ec898ef82a8d66d79421bdcf65ad0460c20136880c324ad2c71211000be7eec0bad5839d5dfe005a1b2c51dd1e66a713f24e709b0de6ecd406e34f876fe3f67b

  • SSDEEP

    3072:4iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoVlzoxss7:4iLVCIT4WK2z1W+CUHZj4Skq/eao7oC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_49ecf7949f91f01b706a91c04a19ff321bcf5482b9a7d4c9dd5f503abcd87920

    • Size

      184KB

    • MD5

      828fbc8031fc5df104b481eac667d3f8

    • SHA1

      a5f626aa3fd83fd64ea43508d7f0d7d3e6db9a92

    • SHA256

      49ecf7949f91f01b706a91c04a19ff321bcf5482b9a7d4c9dd5f503abcd87920

    • SHA512

      ec898ef82a8d66d79421bdcf65ad0460c20136880c324ad2c71211000be7eec0bad5839d5dfe005a1b2c51dd1e66a713f24e709b0de6ecd406e34f876fe3f67b

    • SSDEEP

      3072:4iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoVlzoxss7:4iLVCIT4WK2z1W+CUHZj4Skq/eao7oC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks