General

  • Target

    JaffaCakes118_29153193d601905c67ef3fe58104ae2705b48edf4bb2813c9f3e487c2e8c4412

  • Size

    184KB

  • Sample

    241226-y7xzlsylcx

  • MD5

    4c8034598cb722e315e1621be1511d73

  • SHA1

    9af75c32ba4c5db7e27d44aa40bef0e0e0fa6f94

  • SHA256

    29153193d601905c67ef3fe58104ae2705b48edf4bb2813c9f3e487c2e8c4412

  • SHA512

    c35345f5c4bf38540a19e4f7cd3ff2994cd48064a29e5d34dbec3c1d35b013ac8ee5cd516c5ebe26f106b71a88f4a97e2d5704edf926c019d7c1e5dc7693eba4

  • SSDEEP

    3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoilzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaoIoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_29153193d601905c67ef3fe58104ae2705b48edf4bb2813c9f3e487c2e8c4412

    • Size

      184KB

    • MD5

      4c8034598cb722e315e1621be1511d73

    • SHA1

      9af75c32ba4c5db7e27d44aa40bef0e0e0fa6f94

    • SHA256

      29153193d601905c67ef3fe58104ae2705b48edf4bb2813c9f3e487c2e8c4412

    • SHA512

      c35345f5c4bf38540a19e4f7cd3ff2994cd48064a29e5d34dbec3c1d35b013ac8ee5cd516c5ebe26f106b71a88f4a97e2d5704edf926c019d7c1e5dc7693eba4

    • SSDEEP

      3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoilzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaoIoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks