General

  • Target

    JaffaCakes118_3a333b835475f275694f6c5a9a1c4e5e2c9766a4cee9a6d28d5b4bac9d30a7b0

  • Size

    184KB

  • Sample

    241226-xdz2favncj

  • MD5

    5c4cc9e1615e11db51d35d00d3aebfc4

  • SHA1

    72d3de5002d5eba29669756b3c0424279064234a

  • SHA256

    3a333b835475f275694f6c5a9a1c4e5e2c9766a4cee9a6d28d5b4bac9d30a7b0

  • SHA512

    4f0b77c419605ca758361d2ad2458ff2a742f4724c1f7c0594f609b1f2fb8e2bda64da118b805aecaba6e8902c1eadfa81ba000a8aa25ae028aea6945006cadf

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao5Glzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoOoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3a333b835475f275694f6c5a9a1c4e5e2c9766a4cee9a6d28d5b4bac9d30a7b0

    • Size

      184KB

    • MD5

      5c4cc9e1615e11db51d35d00d3aebfc4

    • SHA1

      72d3de5002d5eba29669756b3c0424279064234a

    • SHA256

      3a333b835475f275694f6c5a9a1c4e5e2c9766a4cee9a6d28d5b4bac9d30a7b0

    • SHA512

      4f0b77c419605ca758361d2ad2458ff2a742f4724c1f7c0594f609b1f2fb8e2bda64da118b805aecaba6e8902c1eadfa81ba000a8aa25ae028aea6945006cadf

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eao5Glzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoOoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks