General

  • Target

    JaffaCakes118_ef4abac6f8709ca942e551175d1dcc324134effc3ef4ff1e6c5fb484060d38cf

  • Size

    184KB

  • Sample

    241228-27h28svncm

  • MD5

    146f325eaba0778923d07c4f24fd81dd

  • SHA1

    c1f5df3f5710571356d490d9cdadc773dd6362f0

  • SHA256

    ef4abac6f8709ca942e551175d1dcc324134effc3ef4ff1e6c5fb484060d38cf

  • SHA512

    c672ffd8b45b168e53b954985b7f05e02bb64a5053b177c3cd4da71586cd7280b3b15a7a11c7c25475ba0373b85f0f8da7ba106ebfb647392343c2dcb1352842

  • SSDEEP

    3072:TiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoMlzoxss7:TiLVCIT4WK2z1W+CUHZj4Skq/eaoyoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_ef4abac6f8709ca942e551175d1dcc324134effc3ef4ff1e6c5fb484060d38cf

    • Size

      184KB

    • MD5

      146f325eaba0778923d07c4f24fd81dd

    • SHA1

      c1f5df3f5710571356d490d9cdadc773dd6362f0

    • SHA256

      ef4abac6f8709ca942e551175d1dcc324134effc3ef4ff1e6c5fb484060d38cf

    • SHA512

      c672ffd8b45b168e53b954985b7f05e02bb64a5053b177c3cd4da71586cd7280b3b15a7a11c7c25475ba0373b85f0f8da7ba106ebfb647392343c2dcb1352842

    • SSDEEP

      3072:TiLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoMlzoxss7:TiLVCIT4WK2z1W+CUHZj4Skq/eaoyoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks