General

  • Target

    JaffaCakes118_b0b14c4c8fb92462576db817fe65fc62fc65230abd7ce2257a924e7d56fc2d24

  • Size

    184KB

  • Sample

    241226-zay13synhq

  • MD5

    480ab4dc7f723a09a70c4c07ef1baca1

  • SHA1

    d4893135172daaa13bb981391ce7cdf9448fa4fe

  • SHA256

    b0b14c4c8fb92462576db817fe65fc62fc65230abd7ce2257a924e7d56fc2d24

  • SHA512

    7a03414f2f6b28ca4549e3e93a74d58d5e7010c784df8625bad2d126e0eec90f80f318c1b58bce4bae195740e8c7e9351daaf5fd2b74ca6aa8847f0aaca6c99a

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaollzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoroC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b0b14c4c8fb92462576db817fe65fc62fc65230abd7ce2257a924e7d56fc2d24

    • Size

      184KB

    • MD5

      480ab4dc7f723a09a70c4c07ef1baca1

    • SHA1

      d4893135172daaa13bb981391ce7cdf9448fa4fe

    • SHA256

      b0b14c4c8fb92462576db817fe65fc62fc65230abd7ce2257a924e7d56fc2d24

    • SHA512

      7a03414f2f6b28ca4549e3e93a74d58d5e7010c784df8625bad2d126e0eec90f80f318c1b58bce4bae195740e8c7e9351daaf5fd2b74ca6aa8847f0aaca6c99a

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaollzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaoroC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks