General

  • Target

    JaffaCakes118_bd077ed12d4e8273a1cfbdc11e74afef725b55c64e0aefbd87f3ee7715c1aa22

  • Size

    184KB

  • Sample

    241227-ag51jawlgm

  • MD5

    f0908fa2d6218cc7baa3884779dbea10

  • SHA1

    d06b58a5519a6b20decd4bfcc8d454a90d7ee033

  • SHA256

    bd077ed12d4e8273a1cfbdc11e74afef725b55c64e0aefbd87f3ee7715c1aa22

  • SHA512

    a94ae03d1e5cee9a40d71727f2baea15a3ee6cdbc12a404182f976c8a45ca94a377a75c353089a3546e7df690c832a546bd079d46426e08ae8f97b894e34f516

  • SSDEEP

    3072:jiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoDlzoxss7:jiLVCIT4WK2z1W+CUHZj4Skq/eaoZoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_bd077ed12d4e8273a1cfbdc11e74afef725b55c64e0aefbd87f3ee7715c1aa22

    • Size

      184KB

    • MD5

      f0908fa2d6218cc7baa3884779dbea10

    • SHA1

      d06b58a5519a6b20decd4bfcc8d454a90d7ee033

    • SHA256

      bd077ed12d4e8273a1cfbdc11e74afef725b55c64e0aefbd87f3ee7715c1aa22

    • SHA512

      a94ae03d1e5cee9a40d71727f2baea15a3ee6cdbc12a404182f976c8a45ca94a377a75c353089a3546e7df690c832a546bd079d46426e08ae8f97b894e34f516

    • SSDEEP

      3072:jiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoDlzoxss7:jiLVCIT4WK2z1W+CUHZj4Skq/eaoZoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks