General

  • Target

    JaffaCakes118_e2b7a80765df0b3ea6b2cc2fcdf5f5afc97293db0d7817fbe70e861888164d96

  • Size

    184KB

  • Sample

    241227-az539awpgt

  • MD5

    0bbc0ba04ccce106a3b0fa06c8cea853

  • SHA1

    57c24272b3cb294f4b565944c9b530e0b9ac9d5e

  • SHA256

    e2b7a80765df0b3ea6b2cc2fcdf5f5afc97293db0d7817fbe70e861888164d96

  • SHA512

    2aa1931f1f623cbdf399f3c9c7949317f08d5d5ed7c472ba085822edff61fc98838f4d329aba9907e9ea846baa2cb4fd74adf0b6234025096916b42922af2a4b

  • SSDEEP

    3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoOlzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaoMoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e2b7a80765df0b3ea6b2cc2fcdf5f5afc97293db0d7817fbe70e861888164d96

    • Size

      184KB

    • MD5

      0bbc0ba04ccce106a3b0fa06c8cea853

    • SHA1

      57c24272b3cb294f4b565944c9b530e0b9ac9d5e

    • SHA256

      e2b7a80765df0b3ea6b2cc2fcdf5f5afc97293db0d7817fbe70e861888164d96

    • SHA512

      2aa1931f1f623cbdf399f3c9c7949317f08d5d5ed7c472ba085822edff61fc98838f4d329aba9907e9ea846baa2cb4fd74adf0b6234025096916b42922af2a4b

    • SSDEEP

      3072:miLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoOlzoxss7:miLVCIT4WK2z1W+CUHZj4Skq/eaoMoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks