General

  • Target

    JaffaCakes118_b7d0f66f3c173bc1cd03f93ffbf046c9adef783800afcca3e1df0f40b102e548

  • Size

    184KB

  • Sample

    241227-atpt3swnc1

  • MD5

    c5f181bcf8b0d88b8fd1722be82a5c79

  • SHA1

    3e731d202ad288d72b4bf9273e25572596cd0ff8

  • SHA256

    b7d0f66f3c173bc1cd03f93ffbf046c9adef783800afcca3e1df0f40b102e548

  • SHA512

    798bff13f957c7df687a91f12c7ba7f62f598d5c943dcef900f09a0ad45f9920512907e8b841dec529a0c072e8661ff2452df089850990476ec7342c2420c4b6

  • SSDEEP

    3072:ciLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoQlzoxss7:ciLVCIT4WK2z1W+CUHZj4Skq/eaouoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b7d0f66f3c173bc1cd03f93ffbf046c9adef783800afcca3e1df0f40b102e548

    • Size

      184KB

    • MD5

      c5f181bcf8b0d88b8fd1722be82a5c79

    • SHA1

      3e731d202ad288d72b4bf9273e25572596cd0ff8

    • SHA256

      b7d0f66f3c173bc1cd03f93ffbf046c9adef783800afcca3e1df0f40b102e548

    • SHA512

      798bff13f957c7df687a91f12c7ba7f62f598d5c943dcef900f09a0ad45f9920512907e8b841dec529a0c072e8661ff2452df089850990476ec7342c2420c4b6

    • SSDEEP

      3072:ciLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoQlzoxss7:ciLVCIT4WK2z1W+CUHZj4Skq/eaouoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks