General

  • Target

    JaffaCakes118_d23fd16cba8e450ac15007708e3cc3087e0e3af4a723de8e54c726e67c40bae7

  • Size

    184KB

  • Sample

    241227-bepq7sxmdk

  • MD5

    07d59e6db35c9dfcd522b168e88d2f29

  • SHA1

    80fcb0e51dd0dfe15105f29b65ba4f7b155db08e

  • SHA256

    d23fd16cba8e450ac15007708e3cc3087e0e3af4a723de8e54c726e67c40bae7

  • SHA512

    56d27e4cf23dcd43acbd9c976d0c71933602faf98b090cc2bf1bdc4d6c81aa7a3267f80c35efb662bd2f0fe168a6ce2977d33f3c2f3424d449877228bf638874

  • SSDEEP

    3072:fiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaovlzoxss7:fiLVCIT4WK2z1W+CUHZj4Skq/eaotoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d23fd16cba8e450ac15007708e3cc3087e0e3af4a723de8e54c726e67c40bae7

    • Size

      184KB

    • MD5

      07d59e6db35c9dfcd522b168e88d2f29

    • SHA1

      80fcb0e51dd0dfe15105f29b65ba4f7b155db08e

    • SHA256

      d23fd16cba8e450ac15007708e3cc3087e0e3af4a723de8e54c726e67c40bae7

    • SHA512

      56d27e4cf23dcd43acbd9c976d0c71933602faf98b090cc2bf1bdc4d6c81aa7a3267f80c35efb662bd2f0fe168a6ce2977d33f3c2f3424d449877228bf638874

    • SSDEEP

      3072:fiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaovlzoxss7:fiLVCIT4WK2z1W+CUHZj4Skq/eaotoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks